<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2024-11-08T23:42:40Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by zCat</title>
  <author>
    <name>zCat</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1zm7jduqq2nmxz5wxh4ujtm00g9vxzqa0r82yt7flvm67yje5gfaqa5pnd6.rss" />
  <link href="https://yabu.me/npub1zm7jduqq2nmxz5wxh4ujtm00g9vxzqa0r82yt7flvm67yje5gfaqa5pnd6" />
  <id>https://yabu.me/npub1zm7jduqq2nmxz5wxh4ujtm00g9vxzqa0r82yt7flvm67yje5gfaqa5pnd6</id>
  <icon>https://play-lh.googleusercontent.com/_Ng5PTAe-Nsj7LRlFAZmPIrm3Jbi8126ol0T3PMBLk240GCAe-IlEjiW2R7A0KIqqqI=w480-h960-rw</icon>
  <logo>https://play-lh.googleusercontent.com/_Ng5PTAe-Nsj7LRlFAZmPIrm3Jbi8126ol0T3PMBLk240GCAe-IlEjiW2R7A0KIqqqI=w480-h960-rw</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsr9f3rm6lc426uxfktlch9gk0m9dy42ak42kzsjeprc63rcynt94qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850ma7h8</id>
    
      <title type="html">⚡ Tails 7.1 released - it changes the home page of Tor Browser ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr9f3rm6lc426uxfktlch9gk0m9dy42ak42kzsjeprc63rcynt94qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850ma7h8" />
    <content type="html">
      ⚡ Tails 7.1 released - it changes the home page of Tor Browser to an offline page and explains better how to set an administration password. #privacy&lt;br/&gt;&lt;br/&gt;source:&lt;br/&gt;&lt;a href=&#34;https://tails.net/news/version_7.1/&#34;&gt;https://tails.net/news/version_7.1/&lt;/a&gt;
    </content>
    <updated>2025-10-15T22:07:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst9kwvu6z3huugt7pt5vla8mvtgxcg7lnzx86lwg2qjhe256jz5mszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85hfdpla</id>
    
      <title type="html">Coinbase should invest into infrastructure and people (to not ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst9kwvu6z3huugt7pt5vla8mvtgxcg7lnzx86lwg2qjhe256jz5mszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85hfdpla" />
    <content type="html">
      Coinbase should invest into infrastructure and people (to not sell customer&amp;#39;s personal data) rather then military parades. It is down... as usual 🤷‍♂️
    </content>
    <updated>2025-10-10T22:10:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdv7s7xpzq53jvcvz7ad6th7cdwfczfc03yx2txnum26ajsgw6gqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85hdzg8w</id>
    
      <title type="html">So, they got some underpaid dude with 500$ lure and then couple ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdv7s7xpzq53jvcvz7ad6th7cdwfczfc03yx2txnum26ajsgw6gqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85hdzg8w" />
    <content type="html">
      So, they got some underpaid dude with 500$ lure and then couple of 1000$. These companies deserve public shame 🤦‍♂️&lt;br/&gt;&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqszxpxegm89u8p9kpxf9dm3tknr7860lyannvd7lmm0dr4gcqkvt4gpzpmhxue69uhkummnw3ezumt0d5hsygqkl5n0qqz57es4r34a0yj7mm6ptpss8tce63zlj0mx7h3ykdzz0gpsgqqqqqqsrrefhg&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…efhg&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; 🚨 Discord hack&lt;br/&gt;&lt;br/&gt;- Name, Discord username, email and other contact details if provided to Discord customer support&lt;br/&gt;- Limited billing information such as payment type, the last four digits of your credit card, and purchase history if associated with your account&lt;br/&gt;- IP addresses&lt;br/&gt;- Messages with our customer service agents &lt;br/&gt;Limited corporate data (training materials, internal presentations)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&#34;&gt;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&lt;/a&gt; &lt;/blockquote&gt;
    </content>
    <updated>2025-10-09T23:26:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8ay8qenjswxl7pn7mu5xu6aldlmchttaxjar9lan9z2rmkvr48lqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85f67hwy</id>
    
      <title type="html">Great, but I am biased</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8ay8qenjswxl7pn7mu5xu6aldlmchttaxjar9lan9z2rmkvr48lqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85f67hwy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgggn5w6qtslxylygq8ujl6jc2y8n6z2eyvrc68s5gzz7cgj7zt5spzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcyaxm0n&#39;&gt;nevent1q…xm0n&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Great, but I am biased
    </content>
    <updated>2025-10-09T23:16:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgdy87g8ankz726cfyxp05z8e4ql658uxxt70m3q9gulcuav8mnhszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ulcqxu</id>
    
      <title type="html">Funny, I watched another YouTube privacy guru who was arrested in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgdy87g8ankz726cfyxp05z8e4ql658uxxt70m3q9gulcuav8mnhszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ulcqxu" />
    <content type="html">
      Funny, I watched another YouTube privacy guru who was arrested in the past for running a dark market. Probably these people should not be giving privacy advice (until you want to end like them) 😬
    </content>
    <updated>2025-10-09T23:13:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2fe6jhdfg872t0xm5phxyr9arnflfypeftm93gsvw352z79afk3szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85naekdf</id>
    
      <title type="html">Jason Hassler: &amp;#34;17 countries have rolled out or passed ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2fe6jhdfg872t0xm5phxyr9arnflfypeftm93gsvw352z79afk3szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85naekdf" />
    <content type="html">
      Jason Hassler: &amp;#34;17 countries have rolled out or passed digital ID laws in the last 3 months:&lt;br/&gt;&lt;br/&gt;-EU&lt;br/&gt;-UK&lt;br/&gt;-Laos&lt;br/&gt;-China&lt;br/&gt;-Taiwan&lt;br/&gt;-Mexico&lt;br/&gt;-Zambia&lt;br/&gt;-Canada&lt;br/&gt;-Ethiopia&lt;br/&gt;-Thailand&lt;br/&gt;-Vietnam&lt;br/&gt;-Australia&lt;br/&gt;-Costa Rica&lt;br/&gt;-Switzerland&lt;br/&gt;-Papua New Guinea&lt;br/&gt;&lt;br/&gt;Totally just a coincidence, I&amp;#39;m sure.&amp;#34; #privacy&lt;br/&gt;&lt;br/&gt;Source: &lt;a href=&#34;https://x.com/JasonBassler1/status/1974623479304687699&#34;&gt;https://x.com/JasonBassler1/status/1974623479304687699&lt;/a&gt;
    </content>
    <updated>2025-10-05T12:16:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszxpxegm89u8p9kpxf9dm3tknr7860lyannvd7lmm0dr4gcqkvt4gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p857749nm</id>
    
      <title type="html">🚨 Discord hack - Name, Discord username, email and other ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszxpxegm89u8p9kpxf9dm3tknr7860lyannvd7lmm0dr4gcqkvt4gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p857749nm" />
    <content type="html">
      🚨 Discord hack&lt;br/&gt;&lt;br/&gt;- Name, Discord username, email and other contact details if provided to Discord customer support&lt;br/&gt;- Limited billing information such as payment type, the last four digits of your credit card, and purchase history if associated with your account&lt;br/&gt;- IP addresses&lt;br/&gt;- Messages with our customer service agents &lt;br/&gt;Limited corporate data (training materials, internal presentations)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&#34;&gt;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&lt;/a&gt;
    </content>
    <updated>2025-10-03T23:48:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstpksr4q7d9lqfgq2wkxug3paxuw56ukgkxu2jwvfpnvtqngvdtngzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uekcfa</id>
    
      <title type="html">BTW, fuck Google, fuck Android *sigh* ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstpksr4q7d9lqfgq2wkxug3paxuw56ukgkxu2jwvfpnvtqngvdtngzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uekcfa" />
    <content type="html">
      BTW, fuck Google, fuck Android *sigh* &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/58b34a2228fd2db9001c583c1bdcc27df0eba564e12fdeddc3068f030696532c.gif&#34;&gt; 
    </content>
    <updated>2025-08-30T11:56:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswyu906tzfwg9hth6fke6akzmpu60pqs45uk9022k8lsk2k4awlqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85u2rgw4</id>
    
      <title type="html">Delete WhatsApp. It is spyware with security holes ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswyu906tzfwg9hth6fke6akzmpu60pqs45uk9022k8lsk2k4awlqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85u2rgw4" />
    <content type="html">
      Delete WhatsApp. It is spyware with security holes&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/BleepinComputer/status/1961466788450894254&#34;&gt;https://x.com/BleepinComputer/status/1961466788450894254&lt;/a&gt;
    </content>
    <updated>2025-08-30T11:46:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9qvgjc0speqj6v6vf8k9wudws3pagn0yzzqjwve2pcaev98fmqtczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uk2z6a</id>
    
      <title type="html">The newest version of zCat, an Android data aggregator for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9qvgjc0speqj6v6vf8k9wudws3pagn0yzzqjwve2pcaev98fmqtczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uk2z6a" />
    <content type="html">
      The newest version of zCat, an Android data aggregator for #Zcash, privacy &amp;amp; security news was released! Please update your app to v0.1.6!       &lt;br/&gt;&lt;br/&gt;Available in multiple languages: EN 🇺🇸, BR 🇧🇷, CS 🇨🇿, DE 🇩🇪, ES 🇪🇸, FR 🇫🇷 &amp;amp; RU 🇷🇺&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://play.google.com/store/apps/details?id=crypto.crab.app.zcat&#34;&gt;https://play.google.com/store/apps/details?id=crypto.crab.app.zcat&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;It is only small patch release with smaller changes and bug fixes (and more languages). More info in the post on Free2Z:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://free2z.cash/zCat/zpage/zcat-the-newest-version-v016-was-released&#34;&gt;https://free2z.cash/zCat/zpage/zcat-the-newest-version-v016-was-released&lt;/a&gt;
    </content>
    <updated>2025-02-21T10:41:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs28s7tjx0v0yz7egr5wnncjapqz3gq0380kvdt0e92kfh5uqqldaqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85n5khdv</id>
    
      <title type="html">New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs28s7tjx0v0yz7egr5wnncjapqz3gq0380kvdt0e92kfh5uqqldaqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85n5khdv" />
    <content type="html">
      New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now&lt;br/&gt;&lt;br/&gt;&amp;#34;Successful MitM exploitation could permit malicious actors to compromise and hijack SSH sessions, and gain unauthorized access to sensitive data.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;DoS attack can result in availability issues, preventing administrators from managing servers and locking legitimate users out, effectively crippling routine operations.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html&#34;&gt;https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #ssh #mitm 
    </content>
    <updated>2025-02-20T07:45:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswkre7htrxffgafwaxcnpr2lsd5fprayhwu57fhmagm264fwndr9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854a8m7k</id>
    
      <title type="html">Hackers Exploit Signal&amp;#39;s Linked Devices Feature to Hijack ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswkre7htrxffgafwaxcnpr2lsd5fprayhwu57fhmagm264fwndr9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854a8m7k" />
    <content type="html">
      Hackers Exploit Signal&amp;#39;s Linked Devices Feature to Hijack Accounts via Malicious QR Codes&lt;br/&gt;&lt;br/&gt;&amp;#34;In the attacks spotted by the Google Threat Intelligence Group, the threat actors, including one it&amp;#39;s tracking as UNC5792, have resorted to malicious QR codes that, when scanned, will link a victim&amp;#39;s account to an actor-controlled Signal instance.&lt;br/&gt;&lt;br/&gt;As a result, future messages get delivered synchronously to both the victim and the threat actor in real-time, thereby granting threat actors a persistent way to eavesdrop on the victim&amp;#39;s conversations. Google said UAC-0195 partially overlaps with a hacking group known as UAC-0195.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html&#34;&gt;https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #privacy #signal
    </content>
    <updated>2025-02-20T07:22:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszgaypexhqpn0dfz6l3egl38lr0sqkx3rcag5mghdcchwdx2649dqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85jvtk5m</id>
    
      <title type="html">Qubes OS 4.2.4 has been released! What is new: - All security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszgaypexhqpn0dfz6l3egl38lr0sqkx3rcag5mghdcchwdx2649dqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85jvtk5m" />
    <content type="html">
      Qubes OS 4.2.4 has been released!&lt;br/&gt;&lt;br/&gt;What is new:&lt;br/&gt;- All security updates to date&lt;br/&gt;- All bug fixes to date&lt;br/&gt;- Included Fedora template upgraded from Fedora 40 to 41&lt;br/&gt;&lt;br/&gt;#privacy #security&lt;br/&gt;&lt;br/&gt;More info:&lt;br/&gt;&lt;a href=&#34;https://www.qubes-os.org/news/2025/02/18/qubes-os-4-2-4-has-been-released/&#34;&gt;https://www.qubes-os.org/news/2025/02/18/qubes-os-4-2-4-has-been-released/&lt;/a&gt;
    </content>
    <updated>2025-02-18T11:18:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9x5e8atkqdjpm5m38l2medxwuyzgyrn07safwsrkyu7953rra5jgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856hz3dn</id>
    
      <title type="html">🦓 The #Zcash Foundation has announced a release of Zebra ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9x5e8atkqdjpm5m38l2medxwuyzgyrn07safwsrkyu7953rra5jgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856hz3dn" />
    <content type="html">
      🦓 The #Zcash Foundation has announced a release of Zebra 2.2.0. &lt;br/&gt;&lt;br/&gt;This release introduces an additional consensus check on the branch ID of NU6 transactions, along with some important refactors and other improvements.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://zfnd.org/zebra-2-2-0-release/&#34;&gt;https://zfnd.org/zebra-2-2-0-release/&lt;/a&gt;
    </content>
    <updated>2025-02-08T10:37:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdfu0xw3kqjlg79py8rx2pxzfvh629td283d9snaq7qft6gq420gqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853th879</id>
    
      <title type="html">💻 Tails has released a security patch with Tails 6.12. These ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdfu0xw3kqjlg79py8rx2pxzfvh629td283d9snaq7qft6gq420gqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853th879" />
    <content type="html">
      💻 Tails has released a security patch with Tails 6.12.&lt;br/&gt;&lt;br/&gt;These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://blog.torproject.org/new-release-tails-6-12/&#34;&gt;https://blog.torproject.org/new-release-tails-6-12/&lt;/a&gt;
    </content>
    <updated>2025-02-08T10:31:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2t56kpfj8mrgjka25m9d0h6nwxn0ks37hg4ssepamw6f3wlwgjeqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855z8kxe</id>
    
      <title type="html">🇨🇿 The president of Czech Republic signed a new set of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2t56kpfj8mrgjka25m9d0h6nwxn0ks37hg4ssepamw6f3wlwgjeqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855z8kxe" />
    <content type="html">
      🇨🇿 The president of Czech Republic signed a new set of rules for cryptocurrencies. &lt;br/&gt;&lt;br/&gt;Tl;Dr: Steps to integrate MiCA and no capital gains tax after 3 years of holding.&lt;br/&gt;&lt;br/&gt;Source (in Czech):&lt;br/&gt;&lt;a href=&#34;https://www.seznamzpravy.cz/clanek/ekonomika-finance-byznys-meny-kryptomeny-prezident-pavel-podepsal-zakon-zavadejici-pravidla-pro-trh-s-kryptomenami-269565&#34;&gt;https://www.seznamzpravy.cz/clanek/ekonomika-finance-byznys-meny-kryptomeny-prezident-pavel-podepsal-zakon-zavadejici-pravidla-pro-trh-s-kryptomenami-269565&lt;/a&gt;
    </content>
    <updated>2025-02-07T08:54:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2s6k7as3d8zdhy60v6yxs876hrl9jgmvqc2wgfe8r6rqmydrv45gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85sr5x55</id>
    
      <title type="html">Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2s6k7as3d8zdhy60v6yxs876hrl9jgmvqc2wgfe8r6rqmydrv45gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85sr5x55" />
    <content type="html">
      Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws,  Adobe Patches Over 160 Vulnerabilities Across 16 Products.&lt;br/&gt;&lt;br/&gt;Today is Microsoft&amp;#39;s December 2024 Patch Tuesday, which includes security updates for 71 flaws, including one actively exploited zero-day vulnerability.&lt;br/&gt;&lt;br/&gt;This Patch Tuesday fixed sixteen critical vulnerabilities, all of which are remote code execution flaws.&lt;br/&gt;&lt;br/&gt;This month&amp;#39;s Patch Tuesday fixes one actively exploited, publicly disclosed zero-day vulnerability CVE-2024-49138 - Windows Common Log File System Driver Elevation of Privilege Vulnerability.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;BleepingComputer :&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/&#34;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/microsoft-ships-urgent-patch-for-exploited-windows-clfs-zero-day/&#34;&gt;https://www.securityweek.com/microsoft-ships-urgent-patch-for-exploited-windows-clfs-zero-day/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Security week (Adobe): &lt;a href=&#34;https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/&#34;&gt;https://www.securityweek.com/adobe-patches-over-160-vulnerabilities-across-16-products/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #microsoft #zeroday #patch
    </content>
    <updated>2024-12-11T07:23:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2gnpu0vkle3kru6tzlff6qnjpnxqtg0yh6z3x3c8fft4s83uw88gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vpmumh</id>
    
      <title type="html">Exploits and vulnerabilities in Q3 2024 Q3 2024 saw multiple ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2gnpu0vkle3kru6tzlff6qnjpnxqtg0yh6z3x3c8fft4s83uw88gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vpmumh" />
    <content type="html">
      Exploits and vulnerabilities in Q3 2024&lt;br/&gt;&lt;br/&gt;Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that are not standard for cyberattacks. This is because operating system developers have been releasing new security mitigations for whole sets of vulnerabilities in commonly used subsystems. &lt;br/&gt;&lt;br/&gt;For example, a log integrity check is set to appear in the Common Log Filing System (CLFS) in Windows, so the number of exploits for it will drop. As for Linux, this operating system has the Linux Kernel Runtime Guard (LKRG), implemented as a separate kernel module. &lt;br/&gt;&lt;br/&gt;Although the first version of LKRG was released back in 2018, it is undergoing constant refinement. And it is becoming more actively used in various Linux builds.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/&#34;&gt;https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #exploits #vulnerabilities
    </content>
    <updated>2024-12-08T07:25:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrt9r3453pg96nce5tfctzu888h25dhqpsfn2ydwv8egn0rhr025qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85aqrzay</id>
    
      <title type="html">SecurityWeek sums up the last week news: ENISA and NCSC release ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrt9r3453pg96nce5tfctzu888h25dhqpsfn2ydwv8egn0rhr025qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85aqrzay" />
    <content type="html">
      SecurityWeek sums up the last week news:&lt;br/&gt;&lt;br/&gt;ENISA and NCSC release cybersecurity reports, abuse of Cloudflare services, FBI warns of gen-AI enabling fraud. &lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/in-other-news-cloudflare-abuse-uk-and-eu-cybersecurity-reports-fbi-gen-ai-alert/&#34;&gt;https://www.securityweek.com/in-other-news-cloudflare-abuse-uk-and-eu-cybersecurity-reports-fbi-gen-ai-alert/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity
    </content>
    <updated>2024-12-08T07:16:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2kxe2jnjrctuccullzwp3492uakh9dwa7x9pmzcp8hwaamm8q3aqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854upwgw</id>
    
      <title type="html">New Windows zero-day exposes NTLM credentials, gets unofficial ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2kxe2jnjrctuccullzwp3492uakh9dwa7x9pmzcp8hwaamm8q3aqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854upwgw" />
    <content type="html">
      New Windows zero-day exposes NTLM credentials, gets unofficial patch&lt;br/&gt;&lt;br/&gt;A new zero-day vulnerability has been discovered that allows attackers to capture NTLM credentials by simply tricking the target into viewing a malicious file in Windows Explorer.&lt;br/&gt;&lt;br/&gt;The flaw was discovered by the 0patch team, a platform that provides unofficial support for end-of-life Windows versions, and was reported to Microsoft. However, no official fix has been released yet.&lt;br/&gt;&lt;br/&gt;According to 0patch, the issue, which currently has no CVE ID, impacts all Windows versions from Windows 7 and Server 2008 R2 up to the latest Windows 11 24H2 and Server 2022.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exposes-ntlm-credentials-gets-unofficial-patch/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exposes-ntlm-credentials-gets-unofficial-patch/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #windows #patch
    </content>
    <updated>2024-12-08T07:04:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsggqgkc3tq69uhzsyaaqd6wl6g9sxh2farukt42uqas98s2y4ra8qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xh0qud</id>
    
      <title type="html">Researchers Uncover Flaws in Popular Open-Source Machine Learning ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsggqgkc3tq69uhzsyaaqd6wl6g9sxh2farukt42uqas98s2y4ra8qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xh0qud" />
    <content type="html">
      Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks&lt;br/&gt;&lt;br/&gt;Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution.&lt;br/&gt;&lt;br/&gt;The vulnerabilities, discovered by JFrog, are part of a broader collection of 22 security shortcomings the supply chain security company first disclosed last month.&lt;br/&gt;&lt;br/&gt;Unlike the first set that involved flaws on the server-side, the newly detailed ones allow exploitation of ML clients and reside in libraries that handle safe model formats like Safetensors.&lt;br/&gt;&lt;br/&gt;&amp;#34;Hijacking an ML client in an organization can allow the attackers to perform extensive lateral movement within the organization,&amp;#34; the company said. &amp;#34;An ML client is very likely to have access to important ML services such as ML Model Registries or MLOps Pipelines.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html&#34;&gt;https://thehackernews.com/2024/12/researchers-uncover-flaws-in-popular.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #machinelearning #malware
    </content>
    <updated>2024-12-08T07:03:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0ry6qusy7pmcc6j2n44rxycr74kgmdnt4utkrskm6aq43zpxvcpqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t7vejt</id>
    
      <title type="html">Crypto-stealing malware posing as a meeting app targets Web3 pros ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0ry6qusy7pmcc6j2n44rxycr74kgmdnt4utkrskm6aq43zpxvcpqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t7vejt" />
    <content type="html">
      Crypto-stealing malware posing as a meeting app targets Web3 pros&lt;br/&gt;&lt;br/&gt;Cybercriminals are targeting people working in Web3 with fake business meetings using a fraudulent video conferencing platform that infects Windows and Macs with crypto-stealing malware.&lt;br/&gt;&lt;br/&gt;The campaign is dubbed &amp;#34;Meeten&amp;#34; after the name commonly used by the meeting software and has been underway since September 2024.&lt;br/&gt;&lt;br/&gt;The malware, which has both a Windows and a macOS version, targets victims&amp;#39; cryptocurrency assets, banking information, information stored on web browsers, and Keychain credentials (on Mac).&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/crypto-stealing-malware-posing-as-a-meeting-app-targets-web3-pros/&#34;&gt;https://www.bleepingcomputer.com/news/security/crypto-stealing-malware-posing-as-a-meeting-app-targets-web3-pros/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #cryptocurrency  #malware
    </content>
    <updated>2024-12-08T06:58:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9n83el227yvcxcnn2drvpt54txjw4l29dg02uzl6xv79hk0dxtjczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85kta6du</id>
    
      <title type="html">Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9n83el227yvcxcnn2drvpt54txjw4l29dg02uzl6xv79hk0dxtjczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85kta6du" />
    <content type="html">
      Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware&lt;br/&gt;&lt;br/&gt;The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting a malware called GammaDrop.&lt;br/&gt;&lt;br/&gt;The activity is part of an ongoing spear-phishing campaign targeting Ukrainian entities since at least early 2024 that&amp;#39;s designed to drop the Visual Basic Script malware, Recorded Future&amp;#39;s Insikt Group said in a new analysis.&lt;br/&gt;&lt;br/&gt;The cybersecurity company is tracking the threat actor under the name BlueAlpha, which is also known as Aqua Blizzard, Armageddon, Hive0051, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, UAC-0010, UNC530, and Winterflounder. The group, believed to be active since 2014, is affiliated with Russia&amp;#39;s Federal Security Service (FSB).&lt;br/&gt;&lt;br/&gt;The tools are chiefly engineered to steal valuable data from web applications running inside internet browsers, email clients, and instant messaging applications such as Signal and Telegram, as well as download additional payloads and propagate the malware via connected USB drives.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html&#34;&gt;https://thehackernews.com/2024/12/hackers-leveraging-cloudflare-tunnels.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #cloudflare #malware
    </content>
    <updated>2024-12-08T06:56:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp4f9afhq05wsg2tuaj4ntp3cjl3fnxk9740z4l8ea326lv203whszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xcwhr6</id>
    
      <title type="html">Critical Vulnerability Discovered in SailPoint IdentityIQ ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp4f9afhq05wsg2tuaj4ntp3cjl3fnxk9740z4l8ea326lv203whszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xcwhr6" />
    <content type="html">
      Critical Vulnerability Discovered in SailPoint IdentityIQ&lt;br/&gt;&lt;br/&gt;SailPoint this week warned that a critical-severity vulnerability in the identity and access management (IAM) platform IdentityIQ could allow attackers to access restricted files.&lt;br/&gt;&lt;br/&gt;SailPoint’s IdentityIQ IAM platform provides full lifecycle and compliance management capabilities covering provisioning, access requests, certifications, and segregation of duties.&lt;br/&gt;&lt;br/&gt;The critical issue, tracked as CVE-2024-10905, has a CVSS score of 10/10 and is described as an improper access control flaw. The bug is, essentially, a directory traversal flaw that affects all IdentityIQ versions up to patch levels 8.4p2, 8.3p5, and 8.2p8.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/critical-vulnerability-discovered-in-sailpoint-identityiq/&#34;&gt;https://www.securityweek.com/critical-vulnerability-discovered-in-sailpoint-identityiq/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #identityiq
    </content>
    <updated>2024-12-06T07:26:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2jklmcrx4phmffkg0eqzalgeladakga6r7tmjdyas4c6tx7va3pgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85h5sp8n</id>
    
      <title type="html">U.S. org suffered four month intrusion by Chinese hackers A large ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2jklmcrx4phmffkg0eqzalgeladakga6r7tmjdyas4c6tx7va3pgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85h5sp8n" />
    <content type="html">
      U.S. org suffered four month intrusion by Chinese hackers&lt;br/&gt;&lt;br/&gt;A large U.S. organization with significant presence in China has been reportedly breached by China-based threat actors who persisted on its networks from April to August 2024.&lt;br/&gt;&lt;br/&gt;According to Symantec’s threat researchers, the operation appeared to focus on intelligence gathering, involving multiple compromised machines and targeting Exchange Servers, likely for email and data exfiltration.&lt;br/&gt;&lt;br/&gt;The researchers did not explicitly name the breached U.S. organization but mentioned that the same entity was targeted by the China-based ‘Daggerfly’ threat group in 2023.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;BleepingComputer:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/&#34;&gt;https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Hackers News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html&#34;&gt;https://thehackernews.com/2024/12/researchers-uncover-4-month-cyberattack.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #cyberattack #breach
    </content>
    <updated>2024-12-06T07:24:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstcn0rgtt0kjwuq8l5fr2nft267c628n2f7njv0rkqgwugqln4vggzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854e89u4</id>
    
      <title type="html">Mitel MiCollab zero-day flaw gets proof-of-concept exploit ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstcn0rgtt0kjwuq8l5fr2nft267c628n2f7njv0rkqgwugqln4vggzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854e89u4" />
    <content type="html">
      Mitel MiCollab zero-day flaw gets proof-of-concept exploit&lt;br/&gt;&lt;br/&gt;Researchers have uncovered an arbitrary file read zero-day in the Mitel MiCollab collaboration platform, allowing attackers to access files on a server&amp;#39;s filesystem.&lt;br/&gt;&lt;br/&gt;Mitel MiCollab is an enterprise collaboration platform that consolidates various communication tools into a single application, offering voice and video calling, messaging, presence information, audio conferencing, mobility support, and team collaboration functionalities.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s utilized by various organizations, including large corporations, small to medium-sized enterprises, and companies operating on a remote or hybrid workforce model.&lt;br/&gt;&lt;br/&gt;The latest vulnerability in the product was discovered by researchers at watchTowr, who, despite having reported to the vendor since August, it remains unfixed after 90 days of being disclosed and waiting for a patch.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;BleepingComputer: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/mitel-micollab-zero-day-flaw-gets-proof-of-concept-exploit/&#34;&gt;https://www.bleepingcomputer.com/news/security/mitel-micollab-zero-day-flaw-gets-proof-of-concept-exploit/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Hacker News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html&#34;&gt;https://thehackernews.com/2024/12/critical-mitel-micollab-flaw-exposes.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #micollab #zeroday
    </content>
    <updated>2024-12-06T07:13:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9ecx3u70xzx3qagkdkg332ff86lz6ywlj2rxlvyahwardrhmgvnszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85aeh6n9</id>
    
      <title type="html">CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9ecx3u70xzx3qagkdkg332ff86lz6ywlj2rxlvyahwardrhmgvnszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85aeh6n9" />
    <content type="html">
      CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel&lt;br/&gt;&lt;br/&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid Proself, ProjectSend, and CyberPanel to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html&#34;&gt;https://thehackernews.com/2024/12/cisa-warns-of-active-exploitation-of.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #kev #cisa&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsxjd044g2vuagfsmseze3a724q6xpqnksej79rwf7800shm3n0dygpz4mhxue69uhkummnw3ezummcw3ezuer9wchsygqkl5n0qqz57es4r34a0yj7mm6ptpss8tce63zlj0mx7h3ykdzz0gpsgqqqqqqsrm83u9&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…83u9&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks&lt;br/&gt;&lt;br/&gt;The US cybersecurity agency CISA on Tuesday warned that a path traversal vulnerability in multiple Zyxel firewall appliances has been exploited in the wild.&lt;br/&gt;&lt;br/&gt;The issue, tracked as CVE-2024-11667 (CVSS score of 7.5), is a high-severity flaw affecting the web management interface of Zyxel ATP, USG FLEX, and USG20(W)-VPN series devices.&lt;br/&gt;&lt;br/&gt;Successful exploitation of the security defect could allow an attacker to download or upload files using crafted URLs, a NIST advisory reads.&lt;br/&gt;&lt;br/&gt;“An attacker may gain unauthorized access to the system, steal credentials, and create backdoor VPN connections by exploiting the vulnerability,” Qualys warned on Tuesday.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/&#34;&gt;https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #zyxel #exploit &lt;/blockquote&gt;
    </content>
    <updated>2024-12-05T07:30:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyph0a7as9khjf4gpd3sjwk75s8aglw66t7rutsvppq9rucc9tnyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ze8re4</id>
    
      <title type="html">Europol Dismantles Criminal Messaging Service MATRIX in Major ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyph0a7as9khjf4gpd3sjwk75s8aglw66t7rutsvppq9rucc9tnyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ze8re4" />
    <content type="html">
      Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown&lt;br/&gt;&lt;br/&gt;Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that&amp;#39;s created by criminals for criminal purposes.&lt;br/&gt;&lt;br/&gt;The joint operation, conducted by French and Dutch authorities under the moniker Passionflower, comes in the aftermath of an investigation that was launched in 2021 after the messaging service was discovered on the phone of a criminal convicted for the murder of a Dutch journalist Peter R. de Vries.&lt;br/&gt;&lt;br/&gt;This allowed authorities to intercept messages being sent via the service for a period of three months, amassing a total of more than 2.3 million messages in 33 languages. The messages, Europol said, are associated with serious crimes such as international drug trafficking, arms trafficking, and money laundering.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s worth noting at this stage that MATRIX is different from the open-source, decentralized messaging app of the same name (&amp;#34;matrix[.]org&amp;#34;). Also known by other names such as Mactrix, Totalsec, X-quantum, and Q-safe, it had at least 8,000 user accounts globally, who paid anywhere between $1,360 and $1,700 in cryptocurrency for a Google Pixel phone and a six-month subscription to the service installed on it.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/europol-dismantles-criminal-messaging.html&#34;&gt;https://thehackernews.com/2024/12/europol-dismantles-criminal-messaging.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #matrix
    </content>
    <updated>2024-12-05T07:14:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz9r6f0uzsd47l4qxfgzdep028qskx08yrsugha732mk9yn5sna2czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85kp5vsu</id>
    
      <title type="html">How to Plan a New (and Improved!) Password Policy for Real-World ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz9r6f0uzsd47l4qxfgzdep028qskx08yrsugha732mk9yn5sna2czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85kp5vsu" />
    <content type="html">
      How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges&lt;br/&gt;&lt;br/&gt;Many organizations struggle with password policies that look strong on paper but fail in practice because they&amp;#39;re too rigid to follow, too vague to enforce, or disconnected from real security needs. &lt;br/&gt;&lt;br/&gt;Password policy must be strict enough to protect your systems, flexible enough for daily work, and precise enough to be enforced consistently. Let&amp;#39;s explore five strategies for building a password policy that works in the real world.&lt;br/&gt;&lt;br/&gt;1. Build compliant password practices&lt;br/&gt;2. Review your existing password obligations&lt;br/&gt;3. Create a policy based on real data&lt;br/&gt;4. Put some muscle in your password policy&lt;br/&gt;5. Create password standards that stick&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/how-to-plan-new-and-improved-password.html&#34;&gt;https://thehackernews.com/2024/12/how-to-plan-new-and-improved-password.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #password #passwordpolicy
    </content>
    <updated>2024-12-05T07:10:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsttqcl3kx8ru9ecv63l9sh3mlntk8jdxdv82mcnyty5r5gu4j73xczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85q2typ8</id>
    
      <title type="html">New DroidBot Android malware targets 77 banking, crypto apps A ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsttqcl3kx8ru9ecv63l9sh3mlntk8jdxdv82mcnyty5r5gu4j73xczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85q2typ8" />
    <content type="html">
      New DroidBot Android malware targets 77 banking, crypto apps&lt;br/&gt;&lt;br/&gt;A new Android banking malware named &amp;#39;DroidBot&amp;#39; attempts to steal credentials for over 77 cryptocurrency exchanges and banking apps in the UK, Italy, France, Spain, and Portugal.&lt;br/&gt;&lt;br/&gt;According to Cleafy researchers who discovered the new Android malware, DroidBot has been active since June 2024 and operates as a malware-as-a-service (MaaS) platform, selling the tool for $3,000/month.&lt;br/&gt;&lt;br/&gt;At least 17 affiliate groups have been identified using malware builders to customize their payloads for specific targets.&lt;br/&gt;&lt;br/&gt;DroidBot&amp;#39;s developers, who appear to be Turkish, provide affiliates with all the tools required to conduct attacks. This includes the malware builder, command and control (C2) servers, and a central administration panel from which they can control their operations, retrieve stolen data, and issue commands.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-droidbot-android-malware-targets-77-banking-crypto-apps/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-droidbot-android-malware-targets-77-banking-crypto-apps/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #android #malware
    </content>
    <updated>2024-12-05T07:01:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvn9rc7kcajfkc8c6fpad66mu97ptwmrkjj9m70sn5adgt6lchxgczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vrfef4</id>
    
      <title type="html">Android’s December 2024 Security Update Patches 14 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvn9rc7kcajfkc8c6fpad66mu97ptwmrkjj9m70sn5adgt6lchxgczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vrfef4" />
    <content type="html">
      Android’s December 2024 Security Update Patches 14 Vulnerabilities&lt;br/&gt;&lt;br/&gt;Google on Tuesday announced patches for 14 high-severity vulnerabilities as part of Android’s December 2024 security update, including a remote code execution flaw in the System component.&lt;br/&gt;&lt;br/&gt;The first part of the update, which arrives on devices as the 2024-12-01 security patch level, resolves six security defects in the Framework and System components, five of which could allow attackers to elevate privileges.&lt;br/&gt;&lt;br/&gt;According to Google’s advisory, however, the sixth of these bugs, which is tracked as CVE-2024-43767 and impacts System, is the most severe issue, as it could lead to remote code execution (RCE) with no additional execution privileges needed.&lt;br/&gt;&lt;br/&gt;Fixes for these defects were included in updated Android 12, 12L, 13, 14, and 15 versions and the source code for these patches has been released to the Android Open Source Project (AOSP) repository.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/androids-december-2024-security-update-patches-14-vulnerabilities/&#34;&gt;https://www.securityweek.com/androids-december-2024-security-update-patches-14-vulnerabilities/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #android
    </content>
    <updated>2024-12-05T06:58:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxjd044g2vuagfsmseze3a724q6xpqnksej79rwf7800shm3n0dygzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85y089t2</id>
    
      <title type="html">CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxjd044g2vuagfsmseze3a724q6xpqnksej79rwf7800shm3n0dygzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85y089t2" />
    <content type="html">
      CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks&lt;br/&gt;&lt;br/&gt;The US cybersecurity agency CISA on Tuesday warned that a path traversal vulnerability in multiple Zyxel firewall appliances has been exploited in the wild.&lt;br/&gt;&lt;br/&gt;The issue, tracked as CVE-2024-11667 (CVSS score of 7.5), is a high-severity flaw affecting the web management interface of Zyxel ATP, USG FLEX, and USG20(W)-VPN series devices.&lt;br/&gt;&lt;br/&gt;Successful exploitation of the security defect could allow an attacker to download or upload files using crafted URLs, a NIST advisory reads.&lt;br/&gt;&lt;br/&gt;“An attacker may gain unauthorized access to the system, steal credentials, and create backdoor VPN connections by exploiting the vulnerability,” Qualys warned on Tuesday.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/&#34;&gt;https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #zyxel #exploit
    </content>
    <updated>2024-12-05T06:56:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf9mgsqgjhkpmcs24wujrxwd0s3nahmp7ytjtwj9u6wjyd9g9uyvczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cazjq2</id>
    
      <title type="html">Critical SailPoint IdentityIQ Vulnerability Exposes Files to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf9mgsqgjhkpmcs24wujrxwd0s3nahmp7ytjtwj9u6wjyd9g9uyvczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cazjq2" />
    <content type="html">
      Critical SailPoint IdentityIQ Vulnerability Exposes Files to Unauthorized Access&lt;br/&gt;&lt;br/&gt;A critical security vulnerability has been disclosed in SailPoint&amp;#39;s IdentityIQ identity and access management (IAM) software that allows unauthorized access to content stored within the application directory.&lt;br/&gt;&lt;br/&gt;The flaw, tracked as CVE-2024-10905, has a CVSS score of 10.0, indicating maximum severity. It affects IdentityIQ versions 8.2. 8.3, 8.4, and other previous versions.&lt;br/&gt;&lt;br/&gt;IdentityIQ &amp;#34;allows HTTP access to static content in the IdentityIQ application directory that should be protected,&amp;#34; according to a description of the flaw on NIST&amp;#39;s National Vulnerability Database (NVD).&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html&#34;&gt;https://thehackernews.com/2024/12/critical-sailpoint-identityiq.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #identityq
    </content>
    <updated>2024-12-04T07:08:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs03rd9s8s4ed4p8ckvdy8rmvkwnmthawwj5tsjzsd477vhjpjrz9czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xs2dxh</id>
    
      <title type="html">With Threats to Encryption Looming, Signal’s Meredith Whittaker ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs03rd9s8s4ed4p8ckvdy8rmvkwnmthawwj5tsjzsd477vhjpjrz9czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85xs2dxh" />
    <content type="html">
      With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’&lt;br/&gt;&lt;br/&gt;At WIRED’s The Big Interview event, the president of the Signal Foundation talked about secure communications as critical infrastructure and the need for a new funding paradigm for tech.&lt;br/&gt;&lt;br/&gt;The secure messaging app Signal is famous for knowing as little about its users as possible. The app isn’t hoarding metadata, tracking you, or showing you ads—in other words, it’s not monetizing user data. Instead, the Signal Foundation is a nonprofit. Its president, Meredith Whittaker, sees a massive shift underway and an “invitation for action” as the monoliths of Big Tech lose popularity and the old economics of Silicon Valley become brittle.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.wired.com/story/big-interview-meredith-whittaker-signal-2024/&#34;&gt;https://www.wired.com/story/big-interview-meredith-whittaker-signal-2024/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#signal #privacy
    </content>
    <updated>2024-12-04T07:03:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspg78nd5zu5lhdf7cj93f36alc5dp806t05mqm2avu4yppsyn794czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85gc3j7a</id>
    
      <title type="html">Veeam warns of critical RCE bug in Service Provider Console Veeam ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspg78nd5zu5lhdf7cj93f36alc5dp806t05mqm2avu4yppsyn794czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85gc3j7a" />
    <content type="html">
      Veeam warns of critical RCE bug in Service Provider Console&lt;br/&gt;&lt;br/&gt;Veeam released security updates today to address two Service Provider Console (VSPC) vulnerabilities, including a critical remote code execution (RCE) discovered during internal testing.&lt;br/&gt;&lt;br/&gt;VSPC, described by the company as a remote-managed BaaS (Backend as a Service) and DRaaS (Disaster Recovery as a Service) platform, is used by service providers to monitor the health and security of customer backups, as well as manage their Veeam-protected virtual, Microsoft 365, and public cloud workloads.&lt;br/&gt;&lt;br/&gt;The first security flaw fixed today (tracked as CVE-2024-42448 and rated with a 9.9/10 severity score) enables attackers to execute arbitrary code on unpatched servers from the VSPC management agent machine.&lt;br/&gt;&lt;br/&gt;Veeam also patched a high-severity vulnerability (CVE-2024-42449) that can let attackers steal the NTLM hash of the VSPC server service account and use the gained access to delete files on the VSPC server.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;BleepingComputer: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/&#34;&gt;https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-rce-bug-in-service-provider-console/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Hackers News: &lt;a href=&#34;https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html&#34;&gt;https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #rce #veeam
    </content>
    <updated>2024-12-04T07:01:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfzulxcclqwzhv3dnac3wv0qzwpvaknrldjgskfhaajypm6zpxjcczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85qvefva</id>
    
      <title type="html">Cloudflare’s developer domains increasingly abused by threat ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfzulxcclqwzhv3dnac3wv0qzwpvaknrldjgskfhaajypm6zpxjcczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85qvefva" />
    <content type="html">
      Cloudflare’s developer domains increasingly abused by threat actors&lt;br/&gt;&lt;br/&gt;Cloudflare&amp;#39;s &amp;#39;pages.dev&amp;#39; and &amp;#39;workers.dev&amp;#39; domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities.&lt;br/&gt;&lt;br/&gt;According to cybersecurity firm Fortra, the abuse of these domains has risen between 100% and 250% compared to 2023.&lt;br/&gt;&lt;br/&gt;The researchers believe the use of these domains is aimed at improving the legitimacy and effectiveness of these malicious campaigns, taking advantage of Cloudflare&amp;#39;s trusted branding, service reliability, low usage costs, and reverse proxying options that complicate detection.&lt;br/&gt;&lt;br/&gt;Cloudflare Pages is a platform designed for front-end developers to build, deploy, and host fast, scalable websites directly on Cloudflare&amp;#39;s global Content Delivery Network (CDN).&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/&#34;&gt;https://www.bleepingcomputer.com/news/security/cloudflares-developer-domains-increasingly-abused-by-threat-actors/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #phishing #cloudflare
    </content>
    <updated>2024-12-04T06:51:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp446wfyeckt0ftvj9yjmxtp33en0x7ad2fjfyshc8x07cpd5qhhczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vrh4gm</id>
    
      <title type="html">Cisco Warns of Exploitation of Decade-Old ASA WebVPN ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp446wfyeckt0ftvj9yjmxtp33en0x7ad2fjfyshc8x07cpd5qhhczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vrh4gm" />
    <content type="html">
      Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability&lt;br/&gt;&lt;br/&gt;Cisco on Monday updated an advisory to warn customers of active exploitation of a decade-old security flaw impacting its Adaptive Security Appliance (ASA).&lt;br/&gt;&lt;br/&gt;The vulnerability, tracked as CVE-2014-2120 (CVSS score: 4.3), concerns a case of insufficient input validation in ASA&amp;#39;s WebVPN login page that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a targeted user of the appliance.&lt;br/&gt;&lt;br/&gt;&amp;#34;An attacker could exploit this vulnerability by convincing a user to access a malicious link,&amp;#34; Cisco noted in an alert released in March 2014.&lt;br/&gt;&lt;br/&gt;As of December 2, 2024, the networking equipment major has revised its bulletin to note that it has become aware of &amp;#34;additional attempted exploitation&amp;#34; of the vulnerability in the wild.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/cisco-warns-of-exploitation-of-decade.html&#34;&gt;https://thehackernews.com/2024/12/cisco-warns-of-exploitation-of-decade.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #xss #webvpn
    </content>
    <updated>2024-12-04T06:42:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqj520whu2sfjtas75v84jpw55xlkmtlwfker86eu36u0tgjt9j7gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85wjpyrm</id>
    
      <title type="html">Horns&amp;amp;Hooves Campaign Delivers RATs via Fake Emails and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqj520whu2sfjtas75v84jpw55xlkmtlwfker86eu36u0tgjt9j7gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85wjpyrm" />
    <content type="html">
      Horns&amp;amp;Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads&lt;br/&gt;&lt;br/&gt;A newly discovered malware campaign has been found to target private users, retailers, and service businesses mainly located in Russia to deliver NetSupport RAT and BurnsRAT.&lt;br/&gt;&lt;br/&gt;The campaign, dubbed Horns&amp;amp;Hooves by Kaspersky, has hit more than 1,000 victims since it began around March 2023. The end goal of these attacks is to leverage the access afforded by these trojans to install stealer malware such as Rhadamanthys and Meduza.&lt;br/&gt;&lt;br/&gt;&amp;#34;Recent months have seen a surge in mailings with lookalike email attachments in the form of a ZIP archive containing JScript scripts,&amp;#34; security researcher Artem Ushkov said in a Monday analysis. &amp;#34;The script files [are] disguised as requests and bids from potential customers or partners.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/12/horns-campaign-delivers-rats-via-fake.html&#34;&gt;https://thehackernews.com/2024/12/horns-campaign-delivers-rats-via-fake.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #malware
    </content>
    <updated>2024-12-03T14:20:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszgpu2h5e246g8jlf3gu3pn66u30fa4vw79ndgszhwg725du8dyzszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853lnrat</id>
    
      <title type="html">Hackers Stole $1.49 Billion in Cryptocurrency to Date in 2024 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszgpu2h5e246g8jlf3gu3pn66u30fa4vw79ndgszhwg725du8dyzszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853lnrat" />
    <content type="html">
      Hackers Stole $1.49 Billion in Cryptocurrency to Date in 2024&lt;br/&gt;&lt;br/&gt;Nearly $1.49 billion in cryptocurrency losses have been registered to date in 2024, mainly due to hacking incidents, a new report from web3 bug bounty platform Immunefi shows.&lt;br/&gt;&lt;br/&gt;The total year-to-date losses have dropped compared to last year, when they surpassed $1.75 billion during the period, and were mainly driven by losses of over $359 million in May and of more than $282 million in July.&lt;br/&gt;&lt;br/&gt;In November, cryptocurrency losses surpassed $71 million, mainly due to hacks ($70,996,200), with only a small percentage lost to rug pulls ($25,300). Total losses were 79% lower compared to November 2023, when they exceeded $343 million.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/&#34;&gt;https://www.securityweek.com/hackers-stole-1-49-billion-in-cryptocurrency-to-date-in-2024/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #cryptocurrency #defi
    </content>
    <updated>2024-12-03T14:17:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgzzzg7988xg3nmp2mu37lmvxt5hwlp2zgkdvy95qa8lm8ezlee0czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85fy5hxj</id>
    
      <title type="html">Location tracking of phones is out of control. Here’s how to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgzzzg7988xg3nmp2mu37lmvxt5hwlp2zgkdvy95qa8lm8ezlee0czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85fy5hxj" />
    <content type="html">
      Location tracking of phones is out of control. Here’s how to fight back.&lt;br/&gt;&lt;br/&gt;Unique IDs assigned to Android and iOS devices threaten your privacy. Who knew?&lt;br/&gt;&lt;br/&gt;You likely have never heard of Babel Street or Location X, but chances are good that they know a lot about you and anyone else you know who keeps a phone nearby around the clock.&lt;br/&gt;&lt;br/&gt;Reston, Virginia-located Babel Street is the little-known firm behind Location X, a service with the capability to track the locations of hundreds of millions of phone users over sustained periods of time.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2024/10/phone-tracking-tool-lets-government-agencies-follow-your-every-move/&#34;&gt;https://arstechnica.com/information-technology/2024/10/phone-tracking-tool-lets-government-agencies-follow-your-every-move/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #tracking #mobile
    </content>
    <updated>2024-12-01T07:56:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy6wdw0j8zejudvvez456t7wcrfvljur7extpetmqr3vdh8wt779qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8552utnw</id>
    
      <title type="html">Zello asks users to reset passwords after security incident Zello ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy6wdw0j8zejudvvez456t7wcrfvljur7extpetmqr3vdh8wt779qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8552utnw" />
    <content type="html">
      Zello asks users to reset passwords after security incident&lt;br/&gt;&lt;br/&gt;Zello is warning customers to reset their passwords if their account was created before November 2nd in what appears to be another security breach.&lt;br/&gt;&lt;br/&gt;Zello is a mobile service with 140 million users that allows first responders, hospitality services, transportation, and family and friends to communicate via their mobile phones using a push-to-talk app.&lt;br/&gt;&lt;br/&gt;Over the past two weeks, numerous people have received security notices from Zello on November 15th asking them to reset their app password.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/&#34;&gt;https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #zello
    </content>
    <updated>2024-11-28T23:45:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszpd2qyqtjww472w8h3x6sy9v6v76gv2w5auyxj6al09fzvwrd2fgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8560xar0</id>
    
      <title type="html">U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszpd2qyqtjww472w8h3x6sy9v6v76gv2w5auyxj6al09fzvwrd2fgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8560xar0" />
    <content type="html">
      U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider&lt;br/&gt;&lt;br/&gt;U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed.&lt;br/&gt;&lt;br/&gt;These intrusion attempts &amp;#34;originated from a wireline provider&amp;#39;s network that was connected to ours,&amp;#34; Jeff Simon, chief security officer at T-Mobile, said in a statement. &amp;#34;We see no instances of prior attempts like this.&amp;#34;&lt;br/&gt;&lt;br/&gt;The company further said its security defenses prevented the threat actors from disrupting its services or obtaining customer information. It has since confirmed that it cut off connectivity to the unnamed provider&amp;#39;s network. It did not explicitly attribute the activity to any known threat actor or group, but noted that it has shared its findings with the U.S. government.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;The Hacker News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html&#34;&gt;https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Bleeping Computer:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/chinese-hackers-breached-t-mobiles-routers-to-scope-out-network/&#34;&gt;https://www.bleepingcomputer.com/news/security/chinese-hackers-breached-t-mobiles-routers-to-scope-out-network/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/&#34;&gt;https://www.securityweek.com/t-mobile-shares-more-information-on-china-linked-cyberattack/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity 
    </content>
    <updated>2024-11-28T23:44:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0xvw4aupw2kum3p7nfeu4gen57haznmve3wvlueau88suaz752dgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85v4ludn</id>
    
      <title type="html">Police bust pirate streaming service making €250 million per ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0xvw4aupw2kum3p7nfeu4gen57haznmve3wvlueau88suaz752dgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85v4ludn" />
    <content type="html">
      Police bust pirate streaming service making €250 million per month&lt;br/&gt;&lt;br/&gt;An international law enforcement operation has dismantled a pirate streaming service that served over 22 million users worldwide and made €250 million ($263M) per month.&lt;br/&gt;&lt;br/&gt;Italy&amp;#39;s Postal and Cybersecurity Police Service announced the action, codenamed &amp;#34;Taken Down,&amp;#34; stating they worked with Eurojust, Europol, and many other European countries, making this the largest takedown of its kind in Italy and internationally.&lt;br/&gt;&lt;br/&gt;&amp;#34;More than 270 Postal Police officers, in collaboration with foreign law enforcement, carried out 89 searches in 15 Italian regions and 14 additional searches in the United Kingdom, the Netherlands, Sweden, Switzerland, Romania, Croatia, and China, involving 102 individuals,&amp;#34; reads the announcement.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/technology/police-bust-pirate-streaming-service-making-250-million-per-month/&#34;&gt;https://www.bleepingcomputer.com/news/technology/police-bust-pirate-streaming-service-making-250-million-per-month/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#pirate #streaming
    </content>
    <updated>2024-11-28T23:30:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqxx4nhrlkrqwt94wjp0yym32pyd9xete7k2ktcq2qeelcc7na0dczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p858z9rc6</id>
    
      <title type="html">APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqxx4nhrlkrqwt94wjp0yym32pyd9xete7k2ktcq2qeelcc7na0dczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p858z9rc6" />
    <content type="html">
      APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign&lt;br/&gt;&lt;br/&gt;The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor.&lt;br/&gt;&lt;br/&gt;That&amp;#39;s according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around August 2024.&lt;br/&gt;&lt;br/&gt;&amp;#34;In this attack, an email purporting to be from a prospective employee was sent to the organization&amp;#39;s recruiting contact, infecting the contact with malware,&amp;#34; the agency said.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html&#34;&gt;https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #malware
    </content>
    <updated>2024-11-28T23:26:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfhhltc4q2nll59zq3eh6hr0af38cans6676plhrs4jzxaprzu45gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85mthsws</id>
    
      <title type="html">New NachoVPN attack uses rogue VPN servers to install malicious ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfhhltc4q2nll59zq3eh6hr0af38cans6676plhrs4jzxaprzu45gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85mthsws" />
    <content type="html">
      New NachoVPN attack uses rogue VPN servers to install malicious updates&lt;br/&gt;&lt;br/&gt;A set of vulnerabilities dubbed &amp;#34;NachoVPN&amp;#34; allows rogue VPN servers to install malicious updates when unpatched Palo Alto and SonicWall SSL-VPN clients connect to them.&lt;br/&gt;&lt;br/&gt;AmberWolf security researchers found that threat actors can trick potential targets into connecting their SonicWall NetExtender and Palo Alto Networks GlobalProtect VPN clients to attacker-controlled VPN servers using malicious websites or documents in social engineering or phishing attacks.&lt;br/&gt;&lt;br/&gt;Threat actors can use the rogue VPN endpoints to steal the victims&amp;#39; login credentials, execute arbitrary code with elevated privileges, install malicious software via updates, and launch code-signing forgery or man-in-the-middle attacks by installing malicious root certificates.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;Bleeping Computer: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-nachovpn-attack-uses-rogue-vpn-servers-to-install-malicious-updates/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/&#34;&gt;https://www.securityweek.com/new-vpn-attack-demonstrated-against-palo-alto-networks-sonicwall-products/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity 
    </content>
    <updated>2024-11-28T01:58:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxrymhw56u7kspfexqrh2qn6kmpqxyjm5f8p8q56rhl5zmr03nwwczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t9r86s</id>
    
      <title type="html">Firefox and Windows zero-days exploited by Russian RomCom hackers ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxrymhw56u7kspfexqrh2qn6kmpqxyjm5f8p8q56rhl5zmr03nwwczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t9r86s" />
    <content type="html">
      Firefox and Windows zero-days exploited by Russian RomCom hackers&lt;br/&gt;&lt;br/&gt;Russian-based RomCom cybercrime group chained two zero-day vulnerabilities in recent attacks targeting Firefox and Tor Browser users across Europe and North America.&lt;br/&gt;&lt;br/&gt;The first flaw (CVE-2024-9680) is a use-after-free bug in Firefox&amp;#39;s animation timeline feature that allows code execution in the web browser&amp;#39;s sandbox. Mozilla patched this vulnerability on October 9, 2024, one day after ESET reported it.&lt;br/&gt;&lt;br/&gt;The second zero-day exploited in this campaign is a privilege escalation flaw (CVE-2024-49039) in the Windows Task Scheduler service, allowing attackers to execute code outside the Firefox sandbox. Microsoft addressed this security vulnerability earlier this month, on November 12.&lt;br/&gt;&lt;br/&gt;RomCom abused the two vulnerabilities as a zero-day chain exploit, which helped them gain remote code execution without requiring user interaction. Their targets only had to visit an attacker-controlled and maliciously crafted website that downloaded and executed the RomCom backdoor on their system.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;Bleeping Computer:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/&#34;&gt;https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Hackers News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html&#34;&gt;https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/russian-apt-chained-firefox-and-windows-zero-days-against-us-and-european-targets/&#34;&gt;https://www.securityweek.com/russian-apt-chained-firefox-and-windows-zero-days-against-us-and-european-targets/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #zeroday #firefox
    </content>
    <updated>2024-11-28T01:53:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvm9fl7ajygznstkfj43gnqu4dun6pqf73hkzyx32hkaywhhf4d6gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85h7w3n8</id>
    
      <title type="html">Researchers Discover &amp;#34;Bootkitty&amp;#34; – First UEFI Bootkit ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvm9fl7ajygznstkfj43gnqu4dun6pqf73hkzyx32hkaywhhf4d6gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85h7w3n8" />
    <content type="html">
      Researchers Discover &amp;#34;Bootkitty&amp;#34; – First UEFI Bootkit Targeting Linux Kernels&lt;br/&gt;&lt;br/&gt;Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed for Linux systems.&lt;br/&gt;&lt;br/&gt;Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use in real-world attacks. Also tracked as IranuKit, it was uploaded to the VirusTotal platform on November 5, 2024.&lt;br/&gt;&lt;br/&gt;&amp;#34;The bootkit&amp;#39;s main goal is to disable the kernel&amp;#39;s signature verification feature and to preload two as yet unknown ELF binaries via the Linux init process (which is the first process executed by the Linux kernel during system startup),&amp;#34; ESET researchers Martin Smolár and Peter Strýček said.&lt;br/&gt;&lt;br/&gt;The development is significant as it heralds a shift in the cyber threat landscape where UEFI bootkits are no longer confined to Windows systems alone.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;The Hackers News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html&#34;&gt;https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;BleepingComputer:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/&#34;&gt;https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/eset-flags-prototype-uefi-bootkit-targeting-linux/&#34;&gt;https://www.securityweek.com/eset-flags-prototype-uefi-bootkit-targeting-linux/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #uefi #bootkit
    </content>
    <updated>2024-11-28T01:47:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8qymglt57z2rd6k50gqlvd09mcpj0p8y2nz8l2q0dl2ctnm60uwgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853lhu8v</id>
    
      <title type="html">Hackers abuse popular Godot game engine to infect thousands of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8qymglt57z2rd6k50gqlvd09mcpj0p8y2nz8l2q0dl2ctnm60uwgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853lhu8v" />
    <content type="html">
      Hackers abuse popular Godot game engine to infect thousands of PCs&lt;br/&gt;&lt;br/&gt;Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months.&lt;br/&gt;&lt;br/&gt;As Check Point Research found while investigating the attacks, threat actors can use this malware loader to target gamers across all major platforms, including Windows, macOS, Linux, Android, and iOS.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s also used to leverage Godot&amp;#39;s flexibility and its GDScript scripting language capabilities to execute arbitrary code and bypass detection systems using the game engine .pck files, which package game assets, to embed harmful scripts.&lt;br/&gt;&lt;br/&gt;Once loaded, the maliciously crafted files trigger malicious code on the victims&amp;#39; devices, enabling attackers to steal credentials or download additional payloads, including the XMRig crypto miner. This miner malware&amp;#39;s configuration was hosted on a private Pastebin file uploaded in May, which was visited 206,913 times throughout the campaign.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #godot #malware
    </content>
    <updated>2024-11-28T01:41:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs09pgq206vl7xvsy8vxnlx99qkm79hfprzfq3329wqrmp6s3jnsygzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855phynu</id>
    
      <title type="html">IBM Patches RCE Vulnerabilities in Data Virtualization Manager, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs09pgq206vl7xvsy8vxnlx99qkm79hfprzfq3329wqrmp6s3jnsygzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855phynu" />
    <content type="html">
      IBM Patches RCE Vulnerabilities in Data Virtualization Manager, Security SOAR&lt;br/&gt;&lt;br/&gt;IBM on Monday announced patches for multiple vulnerabilities across its products, including two high-severity remote code execution (RCE) issues in Data Virtualization Manager and Security SOAR.&lt;br/&gt;&lt;br/&gt;Tracked as CVE-2024-52899 (CVSS score of 8.5), the flaw in Data Virtualization Manager for z/OS could allow a remote, authenticated attacker to inject malicious JDBC URL parameters, which could lead to arbitrary code execution on the server.&lt;br/&gt;&lt;br/&gt;IBM has released fix packs for Data Virtualization Manager for z/OS versions 1.1 and 1.2, and has included instructions on how to download them in its advisory.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/&#34;&gt;https://www.securityweek.com/ibm-patches-rce-vulnerabilities-in-data-virtualization-manager-security-soar/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #ibm #rce
    </content>
    <updated>2024-11-26T18:10:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstkn4drtf9klrhymx335v0lq29huhlpprnkzghlnx73kd9h0wfw9czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85phxh2c</id>
    
      <title type="html">VMware Patches High-Severity Vulnerabilities in Aria Operations ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstkn4drtf9klrhymx335v0lq29huhlpprnkzghlnx73kd9h0wfw9czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85phxh2c" />
    <content type="html">
      VMware Patches High-Severity Vulnerabilities in Aria Operations&lt;br/&gt;&lt;br/&gt;Virtualization software vendor VMware on Tuesday released a high-severity bulletin with patches for at least five security defects in its Aria Operations product.&lt;br/&gt;&lt;br/&gt;The company documented five distinct vulnerabilities in the cloud IT operations platform and warned that malicious hackers can craft exploits to elevate privileges or launch cross-site scripting attacks.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/&#34;&gt;https://www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #vmware
    </content>
    <updated>2024-11-26T18:07:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfx9z6ww0gdwhqsf84yhangvs82flsfq8fxnvwmcl2qd5jtsuksdgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85p68zpf</id>
    
      <title type="html">Critical Vulnerabilities Found in Anti-Spam Plugin Used by ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfx9z6ww0gdwhqsf84yhangvs82flsfq8fxnvwmcl2qd5jtsuksdgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85p68zpf" />
    <content type="html">
      Critical Vulnerabilities Found in Anti-Spam Plugin Used by 200,000 WordPress Sites&lt;br/&gt;&lt;br/&gt;Two critical vulnerabilities in CleanTalk’s anti-spam plugin for WordPress could allow attackers to execute arbitrary code remotely, without authentication, Defiant warns.&lt;br/&gt;&lt;br/&gt;The issues, tracked as CVE-2024-10542 and CVE-2024-10781 (CVSS score of 9.8), affect the ‘Spam protection, Anti-Spam, FireWall by CleanTalk’ plugin, which has more than 200,000 active installations.&lt;br/&gt;&lt;br/&gt;Both flaws could allow remote, unauthenticated attackers to install and activate arbitrary plugins, including vulnerable plugins that could be exploited for remote code execution (RCE).&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;Security Week:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/critical-vulnerabilities-found-in-anti-spam-plugin-used-by-200000-wordpress-sites/&#34;&gt;https://www.securityweek.com/critical-vulnerabilities-found-in-anti-spam-plugin-used-by-200000-wordpress-sites/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The Hacker News:&lt;br/&gt;&lt;a href=&#34;https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html&#34;&gt;https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #wordpress #rce
    </content>
    <updated>2024-11-26T18:01:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswl9npka4uaplw6nnp72384dnp6wamzmvxs5paxjcm4ttumahcqagzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854qfpnr</id>
    
      <title type="html">Starbucks, Grocery Stores Hit by Blue Yonder Ransomware Attack A ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswl9npka4uaplw6nnp72384dnp6wamzmvxs5paxjcm4ttumahcqagzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854qfpnr" />
    <content type="html">
      Starbucks, Grocery Stores Hit by Blue Yonder Ransomware Attack&lt;br/&gt;&lt;br/&gt;A ransomware attack on supply chain management software provider Blue Yonder has caused significant disruptions for some of the company’s customers, including several major firms. &lt;br/&gt;&lt;br/&gt;Arizona-based Blue Yonder revealed on November 21 that its managed services hosted environment had been experiencing disruptions due to a ransomware attack. &lt;br/&gt;&lt;br/&gt;The company immediately launched an investigation and started working on restoring impacted services. In the latest update shared on its website on November 24, Blue Yonder said it had been making steady progress, but did not have a timeline for fully restoring services. &lt;br/&gt;&lt;br/&gt;Blue Yonder said it hired a cybersecurity firm to assist its investigation and restoration efforts, but did not share any other information on the attack itself.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/&#34;&gt;https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #ransomware
    </content>
    <updated>2024-11-26T10:43:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsx7s7yhpecc6ep8nz5mq0s9gyv8t7hrz8zsj8fpq6ac202atkq2qczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859aapx2</id>
    
      <title type="html">CISA Urges Agencies to Patch Critical &amp;#34;Array Networks&amp;#34; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsx7s7yhpecc6ep8nz5mq0s9gyv8t7hrz8zsj8fpq6ac202atkq2qczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859aapx2" />
    <content type="html">
      CISA Urges Agencies to Patch Critical &amp;#34;Array Networks&amp;#34; Flaw Amid Active Attacks&lt;br/&gt;&lt;br/&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild.&lt;br/&gt;&lt;br/&gt;The vulnerability, tracked as CVE-2023-28461 (CVSS score: 9.8), concerns a case of missing authentication that could be exploited to achieve arbitrary code execution remotely. Fixes (version 9.4.0.484) for the security shortcoming were released by the network hardware vendor in March 2023.&lt;br/&gt;&lt;br/&gt;&amp;#34;Array AG/vxAG remote code execution vulnerability is a web security vulnerability that allows an attacker to browse the filesystem or execute remote code on the SSL VPN gateway using flags attribute in HTTP header without authentication,&amp;#34; Array Networks said. &amp;#34;The product can be exploited through a vulnerable URL.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html&#34;&gt;https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #arraynetworks
    </content>
    <updated>2024-11-26T10:40:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyvmuwjjkvtjsdvu9ukh9tqrxfrg5v7hlxl9wqn5s8v8dzqyw79hszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ru3eas</id>
    
      <title type="html">Recent Zyxel Firewall Vulnerability Exploited in Ransomware ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyvmuwjjkvtjsdvu9ukh9tqrxfrg5v7hlxl9wqn5s8v8dzqyw79hszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ru3eas" />
    <content type="html">
      Recent Zyxel Firewall Vulnerability Exploited in Ransomware Attacks&lt;br/&gt;&lt;br/&gt;Zyxel has issued a fresh warning on threat actors exploiting a recently patched command injection vulnerability in its firewalls after security firms have observed a ransomware group targeting the flaw for initial compromise.&lt;br/&gt;&lt;br/&gt;The bug, tracked as CVE-2024-42057, could allow remote attackers to execute OS commands on vulnerable devices, without authentication.&lt;br/&gt;&lt;br/&gt;Zyxel announced patches for this flaw and six other security defects on September 3, explaining that only devices configured in User-Based-PSK authentication mode on which a valid user with a long username exceeding 28 characters exists are affected.&lt;br/&gt;&lt;br/&gt;Zyxel addressed these vulnerabilities with the release of firmware version 5.39 for ATP, USG FLEX, and USG FLEX 50(W)/USG20(W)-VPN series devices.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/&#34;&gt;https://www.securityweek.com/recent-zyxel-firewall-vulnerability-exploited-in-ransomware-attacks/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #ransomware #zyxel
    </content>
    <updated>2024-11-26T10:37:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstylsqn3zk8muse2eth47nf7zygevrdx7xvez5fqp78zzrkmvs6tczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uq39rv</id>
    
      <title type="html">Salt Typhoon hackers backdoor telcos with new GhostSpider malware ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstylsqn3zk8muse2eth47nf7zygevrdx7xvez5fqp78zzrkmvs6tczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85uq39rv" />
    <content type="html">
      Salt Typhoon hackers backdoor telcos with new GhostSpider malware&lt;br/&gt;&lt;br/&gt;The Chinese state-sponsored hacking group Salt Typhoon has been observed utilizing a new &amp;#34;GhostSpider&amp;#34; backdoor in attacks against telecommunication service providers.&lt;br/&gt;&lt;br/&gt;The backdoor was discovered by Trend Micro, which has been monitoring Salt Typhoon&amp;#39;s attacks against critical infrastructure and government organizations worldwide.&lt;br/&gt;&lt;br/&gt;Along with GhostSpider, Trend Micro discovered that the threat group also uses a previously documented Linux backdoor named &amp;#39;Masol RAT,&amp;#39;  a rootkit named &amp;#39;Demodex,&amp;#39; and a modular backdoor shared among Chinese APT groups named &amp;#39;SnappyBee.&amp;#39;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/&#34;&gt;https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #salttyphoon #ghostspider&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsg7g783cjf2k5trw407yrtf2v8uxz9rq4e25rm56y0lf8xa3gpz8cppemhxue69uhkummn9ekx7mp0qgspdlfx7qq9fanp28rt67f9ahh5zkrpqwh3n4z9lylkda0zfv6yy7srqsqqqqqp4tqja4&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…qja4&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks&lt;br/&gt;&lt;br/&gt;A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.&lt;br/&gt;&lt;br/&gt;Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications networks, the protocols that undergird telecommunications, and the various interconnections between providers.&lt;br/&gt;&lt;br/&gt;The threat actor&#39;s malware portfolio includes bespoke tools that facilitate clandestine access, command-and-control (C2), and data exfiltration.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;The Hackers News: &lt;a href=&#34;https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html&#34;&gt;https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Infosecurity magazine:&lt;br/&gt;&lt;a href=&#34;https://www.infosecurity-magazine.com/news/tmobile-breached-chinese/&#34;&gt;https://www.infosecurity-magazine.com/news/tmobile-breached-chinese/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #c2 #hack #SaltTyphoon &lt;/blockquote&gt;
    </content>
    <updated>2024-11-26T00:00:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvvjgjeyuussal96e0pr2an9vs8r8f30keyn4hjkzgyv3paccjuzgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85zqzv56</id>
    
      <title type="html">Advanced threat predictions for 2025 Report from Kaspersky’s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvvjgjeyuussal96e0pr2an9vs8r8f30keyn4hjkzgyv3paccjuzgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85zqzv56" />
    <content type="html">
      Advanced threat predictions for 2025&lt;br/&gt;&lt;br/&gt;Report from Kaspersky’s Global Research and Analysis Team about the future threats and rebalancing last year predictions.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://securelist.com/ksb-apt-predictions-2025/114582/&#34;&gt;https://securelist.com/ksb-apt-predictions-2025/114582/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity
    </content>
    <updated>2024-11-25T23:53:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz4y5hlyp05rnxmsqy7r2hd56766d4esjmwgx5wlga6jc69z3y4mszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85tts595</id>
    
      <title type="html">QNAP addresses critical flaws across NAS, router software QNAP ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz4y5hlyp05rnxmsqy7r2hd56766d4esjmwgx5wlga6jc69z3y4mszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85tts595" />
    <content type="html">
      QNAP addresses critical flaws across NAS, router software&lt;br/&gt;&lt;br/&gt;QNAP has released security bulletins over the weekend, which address multiple vulnerabilities, including three critical severity flaws that users should address as soon as possible.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/&#34;&gt;https://www.bleepingcomputer.com/news/security/qnap-addresses-critical-flaws-across-nas-router-software/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity
    </content>
    <updated>2024-11-25T23:50:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszhaut5aaypgue26wnc50f7fkeszev7ft0yzg5dn3yma55s67yz4czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lcadua</id>
    
      <title type="html">PyPI Python Library &amp;#34;aiocpa&amp;#34; Found Exfiltrating Crypto ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszhaut5aaypgue26wnc50f7fkeszev7ft0yzg5dn3yma55s67yz4czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lcadua" />
    <content type="html">
      PyPI Python Library &amp;#34;aiocpa&amp;#34; Found Exfiltrating Crypto Keys via Telegram Bot&lt;br/&gt;&lt;br/&gt;The administrators of the Python Package Index (PyPI) repository have quarantined the package &amp;#34;aiocpa&amp;#34; following a new update that included malicious code to exfiltrate private keys via Telegram.&lt;br/&gt;&lt;br/&gt;The package in question is described as a synchronous and asynchronous Crypto Pay API client. The package, originally released in September 2024, has been downloaded 12,100 times to date.&lt;br/&gt;&lt;br/&gt;By putting the Python library in quarantine, it prevents further installation by clients and cannot be modified by its maintainers.&lt;br/&gt;&lt;br/&gt;Cybersecurity outfit Phylum, which shared details of the software supply chain attack last week, said the author of the package published the malicious update to PyPI, while keeping the library&amp;#39;s GitHub repository clean in an attempt to evade detection.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/11/pypi-python-library-aiocpa-found.html&#34;&gt;https://thehackernews.com/2024/11/pypi-python-library-aiocpa-found.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #supplychainattack #crypto
    </content>
    <updated>2024-11-25T23:39:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg7g783cjf2k5trw407yrtf2v8uxz9rq4e25rm56y0lf8xa3gpz8czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cgwjy6</id>
    
      <title type="html">China-Backed Hackers Leverage SIGTRAN, GSM Protocols to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg7g783cjf2k5trw407yrtf2v8uxz9rq4e25rm56y0lf8xa3gpz8czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cgwjy6" />
    <content type="html">
      China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks&lt;br/&gt;&lt;br/&gt;A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.&lt;br/&gt;&lt;br/&gt;Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications networks, the protocols that undergird telecommunications, and the various interconnections between providers.&lt;br/&gt;&lt;br/&gt;The threat actor&amp;#39;s malware portfolio includes bespoke tools that facilitate clandestine access, command-and-control (C2), and data exfiltration.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;The Hackers News: &lt;a href=&#34;https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html&#34;&gt;https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Infosecurity magazine:&lt;br/&gt;&lt;a href=&#34;https://www.infosecurity-magazine.com/news/tmobile-breached-chinese/&#34;&gt;https://www.infosecurity-magazine.com/news/tmobile-breached-chinese/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #c2 #hack #SaltTyphoon
    </content>
    <updated>2024-11-21T12:36:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqm3yjuknu9pqlq9fwgmmuvlypv47xucl0hf0f35mqxzgr982wvhgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856hrlf4</id>
    
      <title type="html">&amp;#34;Someone is attacking @nprofile…v5nr right now and has been ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqm3yjuknu9pqlq9fwgmmuvlypv47xucl0hf0f35mqxzgr982wvhgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856hrlf4" />
    <content type="html">
      &amp;#34;Someone is attacking &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nprofile1qqszr7k0w6gclv3usnqmey68uzs6h2yt7dpw2dyeqt0sh8ehaxl8xyqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qz9thwden5te0v35hgar09ec82c30wfjkccte89v5nr&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;The Tor Project&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;nprofile…v5nr&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; right now and has been for a few weeks. &lt;br/&gt;&lt;br/&gt;The attacker is spoofing the IPs of Tor Exit and Directory nodes, and blasting TCP SYN packets indiscriminately  on 22/TCP- spurring a large amount of abuse complaints to hosting providers, which are then temp blocking/banning Tor infrastructure which isn&amp;#39;t actually doing anything wrong.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more in the original Twitter post:&lt;br/&gt;&lt;a href=&#34;https://x.com/Andrew___Morris/status/1854289771197329517&#34;&gt;https://x.com/Andrew___Morris/status/1854289771197329517&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#tor #privacy
    </content>
    <updated>2024-11-08T14:34:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvvhtepv3t8u9aqy6qt0khu58flqyf8g780rt9elstzdyn3gs08dgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cld6kx</id>
    
      <title type="html">qBittorrent fixes flaw exposing users to MitM attacks for 14 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvvhtepv3t8u9aqy6qt0khu58flqyf8g780rt9elstzdyn3gs08dgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85cld6kx" />
    <content type="html">
      qBittorrent fixes flaw exposing users to MitM attacks for 14 years&lt;br/&gt;&lt;br/&gt;qBittorrent has addressed a remote code execution flaw caused by the failure to validate SSL/TLS certificates in the application&amp;#39;s DownloadManager, a component that manages downloads throughout the app.&lt;br/&gt;&lt;br/&gt;The flaw, introduced in a commit on April 6, 2010, was eventually fixed in the latest release, version 5.0.1, on October 28, 2024, more than 14 years later.&lt;br/&gt;&lt;br/&gt;However, as security researcher Sharp Security highlighted in a blog post, the team fixed a notable flaw without adequately informing the users about it and without assigning a CVE to the problem.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/qbittorrent-fixes-flaw-exposing-users-to-mitm-attacks-for-14-years/&#34;&gt;https://www.bleepingcomputer.com/news/security/qbittorrent-fixes-flaw-exposing-users-to-mitm-attacks-for-14-years/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #torrent
    </content>
    <updated>2024-11-01T08:28:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswktz8xj682fl7yet7s9gae2a8mztlt5wktlh4vzmzyajneey70kczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85jz8mue</id>
    
      <title type="html">Tails 6.9 is out! It updates Tor Browser to 14.0.1 and fixes some ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswktz8xj682fl7yet7s9gae2a8mztlt5wktlh4vzmzyajneey70kczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85jz8mue" />
    <content type="html">
      Tails 6.9 is out! It updates Tor Browser to 14.0.1 and fixes some reliability issues in automatic upgrades.&lt;br/&gt;&lt;br/&gt;Changes and updates&lt;br/&gt;- Update Tor Browser to 14.0.1.&lt;br/&gt;- Update the Tor client to 0.4.8.13.&lt;br/&gt;- Update Thunderbird to 115.16.0.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;&lt;a href=&#34;https://tails.net/news/version_6.9/&#34;&gt;https://tails.net/news/version_6.9/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #tails #tor
    </content>
    <updated>2024-10-31T13:21:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8lv0awrslt7956m6ep9a5d6cz9rzr3wsh0xedxew0wqpemd04s9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lg0582</id>
    
      <title type="html">Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8lv0awrslt7956m6ep9a5d6cz9rzr3wsh0xedxew0wqpemd04s9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lg0582" />
    <content type="html">
      Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer&lt;br/&gt;&lt;br/&gt;A malvertising campaign is exploiting Meta’s platform to spread SYS01 infostealer, targeting men 45&#43; via fake ads for popular software. The malware steals Facebook credentials, hijacks accounts espicially those administrating business pages, and spreads further attacks globally.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/&#34;&gt;https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #facebook&lt;br/&gt;
    </content>
    <updated>2024-10-31T13:14:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv0vz2zzd5xga93dnna56e3a5zmsw9mnh72sp068nl3yy4pplhkmgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855k9fec</id>
    
      <title type="html">Honeypot Surprise: Researchers Catch Attackers Exposing 15,000 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv0vz2zzd5xga93dnna56e3a5zmsw9mnh72sp068nl3yy4pplhkmgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p855k9fec" />
    <content type="html">
      Honeypot Surprise: Researchers Catch Attackers Exposing 15,000 Stolen Credentials in S3 Bucket&lt;br/&gt;&lt;br/&gt;Sysdig researchers trace a bizarre S3 bucket misconfiguration to EmeraldWhale, exposing 1.5 terabytes of stolen credentials and script.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/honeypot-surprise-researchers-catch-attackers-exposing-15000-stolen-credentials-in-s3-bucket/&#34;&gt;https://www.securityweek.com/honeypot-surprise-researchers-catch-attackers-exposing-15000-stolen-credentials-in-s3-bucket/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqszc3fufljcn06t48x7jwmuppvw0xw2kyxzvldyt9u4sx7hcxz8v0qpzpmhxue69uhkummnw3ezumt0d5hsygqkl5n0qqz57es4r34a0yj7mm6ptpss8tce63zlj0mx7h3ykdzz0gpsgqqqqqqs4uh9a7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…h9a7&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Hackers steal 15,000 cloud credentials from exposed Git config files&lt;br/&gt;&lt;br/&gt;A large-scale malicious operation named &#34;EmeraldWhale&#34; scanned for exposed Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories.&lt;br/&gt;&lt;br/&gt;Git configuration files, such as /.git/config or .gitlab-ci[.]yml, are used to define various options like repository paths, branches, remotes, and sometimes even authentication information like API keys, access tokens, and passwords.&lt;br/&gt;&lt;br/&gt;According to Sysdig, who discovered the campaign, the operation involves using automated tools that scan IP ranges for exposed Git configuration files, which may include authentication tokens.&lt;br/&gt;&lt;br/&gt;These tokens are then used to download repositories stored on GitHub, GitLab, and BitBucket, which are scanned for further credentials.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/&#34;&gt;https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #git &lt;/blockquote&gt;
    </content>
    <updated>2024-10-31T13:10:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyljhznl4r0res94uzwa8jeufr2jfslsdqttlykh9ua07ffn5f5mczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85mxdl7a</id>
    
      <title type="html">Interbank confirms data breach following failed extortion, data ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyljhznl4r0res94uzwa8jeufr2jfslsdqttlykh9ua07ffn5f5mczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85mxdl7a" />
    <content type="html">
      Interbank confirms data breach following failed extortion, data leak&lt;br/&gt;&lt;br/&gt;​Interbank, one of Peru&amp;#39;s leading financial institutions, has confirmed a data breach after a threat actor who hacked into its systems leaked stolen data online.&lt;br/&gt;&lt;br/&gt;Previously known as the International Bank of Peru (Banco Internacional del Perú), the company provides financial services to over 2 million customers.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/&#34;&gt;https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #cybersecurity
    </content>
    <updated>2024-10-31T13:00:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8jxx7j4f2dmv07mg4m8faazpm79wk2h5r5433pqynckzn6776yxgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85pudjfh</id>
    
      <title type="html">FakeCall Android Trojan Evolves with New Evasion Tactics and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8jxx7j4f2dmv07mg4m8faazpm79wk2h5r5433pqynckzn6776yxgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85pudjfh" />
    <content type="html">
      FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities&lt;br/&gt;&lt;br/&gt;The sophisticated vishing malware known as FakeCall (aka Fakecalls) has become more sophisticated. New research shows an increase in evasion and espionage capabilities for an Android malware that has been known and classified as a banking trojan largely targeting South Korea.&lt;br/&gt;&lt;br/&gt;In addition to vishing (voice phishing), FakeCall could also capture live audio and video streams from the infected devices, allowing attackers to steal sensitive data without victim interaction.&lt;br/&gt;&lt;br/&gt;Callie Guenther, senior manager of cyber threat research at Critical Start, told SecurityWeek, “The techniques used, such as native API utilization, advanced obfuscation, and remote surveillance, resemble TTPs seen in state-sponsored campaigns. Although not definitively attributed, these capabilities align with those observed in APT groups focused on espionage and high-value financial targeting.”&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;Security week:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/fakecall-android-trojan-evolves-with-new-evasion-tactics-and-expanded-espionage-capabilities/&#34;&gt;https://www.securityweek.com/fakecall-android-trojan-evolves-with-new-evasion-tactics-and-expanded-espionage-capabilities/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Bleeping Comuper:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/&#34;&gt;https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #vishing
    </content>
    <updated>2024-10-31T12:22:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxqjdaxwscj7yyesrfx4rhsrah8zhk3ml0mplxpf946gns5eduzcgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85wg7m4q</id>
    
      <title type="html">Opera Browser Fixes Big Security Hole That Could Have Exposed ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxqjdaxwscj7yyesrfx4rhsrah8zhk3ml0mplxpf946gns5eduzcgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85wg7m4q" />
    <content type="html">
      Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information&lt;br/&gt;&lt;br/&gt;A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs.&lt;br/&gt;&lt;br/&gt;The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said.&lt;br/&gt;&lt;br/&gt;To demonstrate the issue, the company said it managed to publish a seemingly harmless browser extension to the Chrome Web Store that could then exploit the flaw when installed on Opera, making it an instance of a cross-browser-store attack.&lt;br/&gt;&lt;br/&gt;The issue has been addressed by Opera as of September 24, 2024, following responsible disclosure. That said, this is not the first time security flaws have been identified in the browser.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/10/opera-browser-fixes-big-security-hole.html&#34;&gt;https://thehackernews.com/2024/10/opera-browser-fixes-big-security-hole.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #opera
    </content>
    <updated>2024-10-31T12:02:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgslr8nfj243rwryefk0n6p8mh3cv5fhjyp2lnlrzlmvgg4ngrxeszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85r4dery</id>
    
      <title type="html">Google and Mozilla on Tuesday announced security updates for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgslr8nfj243rwryefk0n6p8mh3cv5fhjyp2lnlrzlmvgg4ngrxeszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85r4dery" />
    <content type="html">
      Google and Mozilla on Tuesday announced security updates for their Chrome and Firefox web browsers, and some of the vulnerabilities they patch are potentially severe.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/&#34;&gt;https://www.securityweek.com/google-patches-critical-chrome-vulnerability-reported-by-apple/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #chrome #mozilla
    </content>
    <updated>2024-10-31T11:59:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszc3fufljcn06t48x7jwmuppvw0xw2kyxzvldyt9u4sx7hcxz8v0qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vq2vuy</id>
    
      <title type="html">Hackers steal 15,000 cloud credentials from exposed Git config ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszc3fufljcn06t48x7jwmuppvw0xw2kyxzvldyt9u4sx7hcxz8v0qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85vq2vuy" />
    <content type="html">
      Hackers steal 15,000 cloud credentials from exposed Git config files&lt;br/&gt;&lt;br/&gt;A large-scale malicious operation named &amp;#34;EmeraldWhale&amp;#34; scanned for exposed Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories.&lt;br/&gt;&lt;br/&gt;Git configuration files, such as /.git/config or .gitlab-ci[.]yml, are used to define various options like repository paths, branches, remotes, and sometimes even authentication information like API keys, access tokens, and passwords.&lt;br/&gt;&lt;br/&gt;According to Sysdig, who discovered the campaign, the operation involves using automated tools that scan IP ranges for exposed Git configuration files, which may include authentication tokens.&lt;br/&gt;&lt;br/&gt;These tokens are then used to download repositories stored on GitHub, GitLab, and BitBucket, which are scanned for further credentials.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/&#34;&gt;https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #git
    </content>
    <updated>2024-10-31T11:55:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrsvfczwajjcfu43aszzp4jl03kvjumfwr7e9lsdp3vf0uru9f82qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p857573hv</id>
    
      <title type="html">LottieFiles hit in npm supply chain attack targeting users&amp;#39; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrsvfczwajjcfu43aszzp4jl03kvjumfwr7e9lsdp3vf0uru9f82qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p857573hv" />
    <content type="html">
      LottieFiles hit in npm supply chain attack targeting users&amp;#39; crypto&lt;br/&gt;&lt;br/&gt;LottieFiles announced that specific versions of its npm package carry malicious code that prompts users to connect their cryptocurrency wallets so they can be emptied.&lt;br/&gt;&lt;br/&gt;As discovered yesterday, following multiple user reports about strange code injections, the affected versions are Lottie Web Player (“lottie-player”) 2.0.5, 2.0.6, and 2.0.7, all published yesterday.&lt;br/&gt;&lt;br/&gt;LottieFiles quickly released a new version, 2.0.8, which is based on the clean 2.0.4, advising users to upgrade to it as soon as possible.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/&#34;&gt;https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #crypto
    </content>
    <updated>2024-10-31T11:48:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2jayxnqjsuz6svsx7fqnqtwu0f4kw4vj64kj5n5sgdyv7kxszcjgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856jg8uw</id>
    
      <title type="html">ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2jayxnqjsuz6svsx7fqnqtwu0f4kw4vj64kj5n5sgdyv7kxszcjgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856jg8uw" />
    <content type="html">
      ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis&lt;br/&gt;&lt;br/&gt;Malicious instructions encoded in hexadecimal format could have been used to bypass ChatGPT safeguards designed to prevent misuse. &lt;br/&gt;&lt;br/&gt;The new jailbreak was disclosed on Monday by Marco Figueroa, gen-AI bug bounty programs manager at Mozilla, through the 0Din bug bounty program.&lt;br/&gt;&lt;br/&gt;If a user instructs the chatbot to write an exploit for a specified CVE, they are informed that the request violates usage policies. However, if the request was encoded in hexadecimal format, the guardrails were bypassed and ChatGPT not only wrote the exploit, but also attempted to execute it “against itself”, according to Figueroa.&lt;br/&gt;&lt;br/&gt;See more&lt;br/&gt;Security Week: &lt;a href=&#34;https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/&#34;&gt;https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Dark Reading: &lt;a href=&#34;https://www.darkreading.com/application-security/chatgpt-manipulated-hex-code&#34;&gt;https://www.darkreading.com/application-security/chatgpt-manipulated-hex-code&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #ai #chatgpt #jailbreak
    </content>
    <updated>2024-10-30T08:06:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdkdxnf23sdd587x2pvrrt2d9c4m4pc5hxspe4vxdd4hzrachtjuqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ea0dyr</id>
    
      <title type="html">Italian Politicians Express Alarm at Latest Data Breach Allegedly ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdkdxnf23sdd587x2pvrrt2d9c4m4pc5hxspe4vxdd4hzrachtjuqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85ea0dyr" />
    <content type="html">
      Italian Politicians Express Alarm at Latest Data Breach Allegedly Affecting 800,000 Citizens&lt;br/&gt;&lt;br/&gt;Italian politicians called Monday for better protection of citizens’ online data following a probe into a hacking scheme that allegedly breached law enforcement, tax authority and other sensitive public data.&lt;br/&gt;&lt;br/&gt;According to prosecutors in Milan, the data of at least 800,000 Italians was compromised in breaches dating from 2022 by a private investigative agency that compiled dossiers for a fee on top Italian business and political figures. Prosecutors were still investigating which officials had been targeted.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/&#34;&gt;https://www.securityweek.com/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #privacy
    </content>
    <updated>2024-10-30T07:56:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvkssfdfhzyvar0sytkakk8730l30rtutdy6k9sm8cpqe0qx49u0czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85s9rt0q</id>
    
      <title type="html">Apple Patches Over 70 Vulnerabilities Across iOS, macOS, Other ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvkssfdfhzyvar0sytkakk8730l30rtutdy6k9sm8cpqe0qx49u0czyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85s9rt0q" />
    <content type="html">
      Apple Patches Over 70 Vulnerabilities Across iOS, macOS, Other Products&lt;br/&gt;&lt;br/&gt;Apple on Monday announced fresh security updates for both iOS and macOS users, addressing over 70 CVEs across its platforms, including several bugs leading to protected file system modifications.&lt;br/&gt;&lt;br/&gt;iOS 18.1 and iPadOS 18.1 are now rolling out to mobile users with patches for 28 vulnerabilities that could lead to information leaks, the disclosure of process memory, denial-of-service, sandbox escape, modification of protected system files, heap corruption, and access to restricted files.&lt;br/&gt;&lt;br/&gt;The tech giant points to similar outcomes and resolutions for 59 security defects that were resolved with the macOS Sequoia 15.1 update that started rolling out on Monday. The patches address 15 issues that were also addressed in iOS and several flaws in third-party dependencies.&lt;br/&gt;&lt;br/&gt;Additionally, Apple released macOS Sonoma 14.7.1 and macOS Ventura 13.7.1 with fixes for over 40 defects each, and announced the rollout of watchOS, tvOS, and visionOS security updates as well.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/&#34;&gt;https://www.securityweek.com/apple-patches-over-70-vulnerabilities-across-ios-macos-other-products/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #apple #ios
    </content>
    <updated>2024-10-30T07:54:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2pp0ddlg4m72fge09yezjhuj7q24pqhcy9pllzhqr83tjgk0vengzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85dw9gm0</id>
    
      <title type="html">Free, France’s second largest ISP, confirms data breach after ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2pp0ddlg4m72fge09yezjhuj7q24pqhcy9pllzhqr83tjgk0vengzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85dw9gm0" />
    <content type="html">
      Free, France’s second largest ISP, confirms data breach after leak&lt;br/&gt;&lt;br/&gt;Free, a major internet service provider (ISP) in France, confirmed over the weekend that hackers breached its systems and stole customer personal information.&lt;br/&gt;&lt;br/&gt;The company, which says it had over 22.9 million mobile and fixed subscribers at the end of June, is the second-largest telecommunications company in France and a subsidiary of the Iliad Group, Europe&amp;#39;s sixth-largest mobile operator by number of subscribers.&lt;br/&gt;&lt;br/&gt;Free has since filed a criminal complaint with the public prosecutor and notified the French National Commission for Information Technology and Civil Liberties (CNIL) and the National Agency for the Security of Information Systems (ANSSI) of the incident.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/&#34;&gt;https://www.bleepingcomputer.com/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #privacy
    </content>
    <updated>2024-10-29T08:41:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs85x9a7vuasxugxelyk78f724utja6fcf85f2zdwfk3xjvvuqpykgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85w9emat</id>
    
      <title type="html">Google Invests in Alternative Neutral Atom Quantum Technology ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs85x9a7vuasxugxelyk78f724utja6fcf85f2zdwfk3xjvvuqpykgzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85w9emat" />
    <content type="html">
      Google Invests in Alternative Neutral Atom Quantum Technology&lt;br/&gt;&lt;br/&gt;Google has privately invested in a firm developing a very different and potentially rival quantum computer technology.&lt;br/&gt;&lt;br/&gt;Google, a major figure in quantum computer development using superconducting technology to produce quantum bits (qubits), has invested a multi-million dollar sum into a firm developing an entirely different quantum technology: neutral atoms.&lt;br/&gt;&lt;br/&gt;In mid-October 2024 – five years after Google announced it had achieved ‘quantum supremacy’ in 2019 – it invested in the quantum hardware firm QuEra Computing. This was a private investment in a private firm that was founded in 2018. The investment is outside of venture funding, and there are no disclosed details.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/google-invests-in-alternative-neutral-atom-quantum-technology/&#34;&gt;https://www.securityweek.com/google-invests-in-alternative-neutral-atom-quantum-technology/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#technology #cybersecurity #google #quantumcomputing
    </content>
    <updated>2024-10-29T08:38:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswez5w7jnr9n6kzaufcwue94gzj28mq7n3ta3fay4w6m6m8rnyn9szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8599pxgl</id>
    
      <title type="html">Hard-Coded Credentials Vulnerability Found In Kubernetes Image ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswez5w7jnr9n6kzaufcwue94gzj28mq7n3ta3fay4w6m6m8rnyn9szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8599pxgl" />
    <content type="html">
      Hard-Coded Credentials Vulnerability Found In Kubernetes Image Builder&lt;br/&gt;&lt;br/&gt;A critical vulnerability just received a fix with the latest Kubernetes Image Builder release. The vulnerability existed due to hard-coded credentials allowing unauthorized access to an adversary&lt;br/&gt;&lt;br/&gt;According to its latest advisory, two security issues received patches with the latest Kubernetes Image Builder. One of these, identified as CVE-2024-9486 (CVSS score of 9.8), existed due to hard-coded credentials enabled during the image-building process. These credentials would remain enabled even with the virtual machines (VMs) built with the Proxmox provider, exposing any nodes using the images to root access from an unauthorized adversary.&lt;br/&gt;&lt;br/&gt;In addition, the same Image Builder release also addressed another security flaw, identified as CVE-2024-9594. This medium-severity vulnerability (CVSS 6.3) is the same issue explained above; however, the severity is less for images built with Nutanix, OVA, QEMU, or raw providers. Hence, it’s identified separately and explained here on GitHub.&lt;br/&gt;&lt;br/&gt;Users must ensure updating to the Kubernetes Image Builder version 0.1.38 or later to receive all the patches.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://latesthackingnews.com/2024/10/28/hard-coded-credentials-vulnerability-found-in-kubernetes-image-builder/&#34;&gt;https://latesthackingnews.com/2024/10/28/hard-coded-credentials-vulnerability-found-in-kubernetes-image-builder/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #kubernetes
    </content>
    <updated>2024-10-29T08:28:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrhjnuwhy7vzawru03kyyhyh6gtwu04mzt298f9nma9qn3cxfwrjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854uswzs</id>
    
      <title type="html">New tool bypasses Google Chrome’s new cookie encryption system ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrhjnuwhy7vzawru03kyyhyh6gtwu04mzt298f9nma9qn3cxfwrjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p854uswzs" />
    <content type="html">
      New tool bypasses Google Chrome’s new cookie encryption system&lt;br/&gt;&lt;br/&gt;A researcher has released a tool to bypass Google&amp;#39;s new App-Bound encryption cookie-theft defenses and extract saved credentials from the Chrome web browser.&lt;br/&gt;&lt;br/&gt;The tool, named &amp;#39;Chrome-App-Bound-Encryption-Decryption,&amp;#39; was released by cybersecurity researcher Alexander Hagenah after he noticed that others were already figuring out similar bypasses.&lt;br/&gt;&lt;br/&gt;Although the tool achieves what multiple infostealer operations have already added to their malware, its public availability raises the risk for Chrome users who continue to store sensitive data in their browsers.&lt;br/&gt; &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-tool-bypasses-google-chromes-new-cookie-encryption-system/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-tool-bypasses-google-chromes-new-cookie-encryption-system/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #privacy
    </content>
    <updated>2024-10-29T08:16:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyxvumjak6qwpkdn6frr2prn8ckqqj6fp5mr4l9mwhz0dq6c3vl7gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859smh8s</id>
    
      <title type="html">Chinese Hackers Use CloudScout Toolset to Steal Session Cookies ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyxvumjak6qwpkdn6frr2prn8ckqqj6fp5mr4l9mwhz0dq6c3vl7gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859smh8s" />
    <content type="html">
      Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services&lt;br/&gt;&lt;br/&gt;A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset codenamed CloudScout.&lt;br/&gt;&lt;br/&gt;&amp;#34;The CloudScout toolset is capable of retrieving data from various cloud services by leveraging stolen web session cookies,&amp;#34; ESET security researcher Anh Ho said. &amp;#34;Through a plugin, CloudScout works seamlessly with MgBot, Evasive Panda&amp;#39;s signature malware framework.&amp;#34;&lt;br/&gt;&lt;br/&gt;The use of the .NET-based malware tool, per the Slovak cybersecurity company, was detected between May 2022 and February 2023. It incorporates 10 different modules, written in C#, out of which three are meant for stealing data from Google Drive, Gmail, and Outlook. The purpose of the remaining modules remains unknown.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/10/chinese-hackers-use-cloudscout-toolset.html&#34;&gt;https://thehackernews.com/2024/10/chinese-hackers-use-cloudscout-toolset.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-29T08:11:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxt7rahlcxu5rjvsvu8mx047wptya9c3jnzw32c707dmxcf4vfa9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t45fs4</id>
    
      <title type="html">US says Chinese hackers breached multiple telecom providers The ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxt7rahlcxu5rjvsvu8mx047wptya9c3jnzw32c707dmxcf4vfa9gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85t45fs4" />
    <content type="html">
      US says Chinese hackers breached multiple telecom providers&lt;br/&gt;&lt;br/&gt;The FBI and the U.S. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) have disclosed that Chinese hackers breached commercial telecommunication service providers in the United States.&lt;br/&gt;&lt;br/&gt;The breached entities have been warned, and the agencies are proactively alerting other potential targets of the elevated cyber activity.&lt;br/&gt;&lt;br/&gt;&amp;#34;The U.S. Government is investigating the unauthorized access to commercial telecommunications infrastructure by actors affiliated with the People&amp;#39;s Republic of China,&amp;#34; reads the announcement.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/us-says-chinese-hackers-breached-multiple-telecom-providers/&#34;&gt;https://www.bleepingcomputer.com/news/security/us-says-chinese-hackers-breached-multiple-telecom-providers/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-29T08:08:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd5ty4r2nv6jr0hf5hleeylpuwlvmjcgcrsj5p4p4wf2dgzcl9k6gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85845p8c</id>
    
      <title type="html">Researchers Uncover OS Downgrade Vulnerability Targeting ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd5ty4r2nv6jr0hf5hleeylpuwlvmjcgcrsj5p4p4wf2dgzcl9k6gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85845p8c" />
    <content type="html">
      Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel&lt;br/&gt;&lt;br/&gt;A new attack technique could be used to bypass Microsoft&amp;#39;s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks.&lt;br/&gt;&lt;br/&gt;&amp;#34;This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more,&amp;#34; SafeBreach researcher Alon Leviev said in a report shared with The Hacker News.&lt;br/&gt;&lt;br/&gt;The latest findings build on an earlier analysis that uncovered two privilege escalation flaws in the Windows update process (CVE-2024-21302 and CVE-2024-38202) that could be weaponized to rollback an up-to-date Windows software to an older version containing unpatched security vulnerabilities.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;TheHackerNews: &lt;a href=&#34;https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html&#34;&gt;https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;SecurityWeek:&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/more-details-shared-on-windows-downgrade-attacks-after-microsoft-rolls-out-mitigations/&#34;&gt;https://www.securityweek.com/more-details-shared-on-windows-downgrade-attacks-after-microsoft-rolls-out-mitigations/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-29T08:03:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspdpq4tvcnhhrck5gqyjme3960mpunfavnxy5nwq86cxrmtkysyqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lwyhr8</id>
    
      <title>Nostr event nevent1qqspdpq4tvcnhhrck5gqyjme3960mpunfavnxy5nwq86cxrmtkysyqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lwyhr8</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspdpq4tvcnhhrck5gqyjme3960mpunfavnxy5nwq86cxrmtkysyqczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lwyhr8" />
    <content type="html">
       &lt;img src=&#34;https://image.nostr.build/568e1824567a4e9f616be1e0af575dfee2d6bf6e224d23389c2e15b0922038e7.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt;Happy Birthday Zcash! On this day, 28th October 2016, 8 years ago was generated the genesis block of the Zcash blockchain.&lt;br/&gt;&lt;br/&gt;Zcash was the first real-world application of zero-knowledge proofs, a novel method by which one party (the prover) can prove to another (the verifier) that a statement is true, without revealing any information beyond the validity of the statement itself.&lt;br/&gt;&lt;br/&gt;#zcash #zk #privacy
    </content>
    <updated>2024-10-28T19:39:22Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw3lh2lk7hmxpj2hqv0zenkvr4yhhcmmspsn38kma7v2ez94edq2gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lthjwv</id>
    
      <title type="html">Several Linux Kernel Driver Maintainers Removed Due To Their ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw3lh2lk7hmxpj2hqv0zenkvr4yhhcmmspsn38kma7v2ez94edq2gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85lthjwv" />
    <content type="html">
      Several Linux Kernel Driver Maintainers Removed Due To Their Association To Russia.&lt;br/&gt;&lt;br/&gt;It was described as due to &amp;#34;compliance requirements&amp;#34; but vague in what those requirements entailed. Linus Torvalds then commented on the Russian Linux maintainers being de-listed and made it clear that they were done due to government compliance requirements / legal issues around Russia. Now today some additional light has been shed on those new Linux kernel &amp;#34;compliance requirements&amp;#34;.&lt;br/&gt;&lt;br/&gt;Longtime Linux developer and EXT4 file-system maintainer Ted Ts&amp;#39;o has also provided some clarity on a separate Linux kernel mailing list thread. In response to a suggested patch removing Huawei from the MAINTAINERS file given their known relations with the Chinese government there was more discussion about possible future removals.&lt;br/&gt;&lt;br/&gt;See original news:&lt;br/&gt;&lt;a href=&#34;https://www.phoronix.com/news/Russian-Linux-Maintainers-Drop&#34;&gt;https://www.phoronix.com/news/Russian-Linux-Maintainers-Drop&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;See Torvalds statement:&lt;br/&gt;&lt;a href=&#34;https://www.phoronix.com/news/Linus-Torvalds-Russian-Devs&#34;&gt;https://www.phoronix.com/news/Linus-Torvalds-Russian-Devs&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;See Compliance Requirements update:&lt;br/&gt;&lt;a href=&#34;https://www.phoronix.com/news/Linux-Compliance-Requirements&#34;&gt;https://www.phoronix.com/news/Linux-Compliance-Requirements&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;See the original commit:&lt;br/&gt;&lt;a href=&#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e90b675cf94&#34;&gt;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e90b675cf94&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#linux #cybersecurity
    </content>
    <updated>2024-10-25T11:10:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9x72p78c2h9sjdxlqypjdc80dvavvmzauky3ew2znlzmqlkuykyczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8590nnrp</id>
    
      <title type="html">QNAP, Synology, Lexmark devices hacked on Pwn2Own Day 3 The third ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9x72p78c2h9sjdxlqypjdc80dvavvmzauky3ew2znlzmqlkuykyczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8590nnrp" />
    <content type="html">
      QNAP, Synology, Lexmark devices hacked on Pwn2Own Day 3&lt;br/&gt;&lt;br/&gt;The third day of Pwn2Own Ireland 2024 continued to showcase the expertise of white hat hackers as they exposed 11 zero-day vulnerabilities, adding $124,750 to the total prize pool, which now stands at $874,875.&lt;br/&gt;&lt;br/&gt;Pwn2Own, a global hacking competition, challenges top security researchers to exploit a range of software and hardware devices, with the ultimate goal of earning the prestigious &amp;#34;Master of Pwn&amp;#34; title and claiming up to $1 million in rewards.&lt;br/&gt;&lt;br/&gt;On Day 1, participants uncovered 52 zero-day vulnerabilities, and on Day 2, another 51 zero-days were added.&lt;br/&gt;&lt;br/&gt;Yesterday, the competition saw impressive performances from teams representing Viettel Cyber Security, DEVCORE, and PHP Hooligans/Midnight Blue, among others.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/qnap-synology-lexmark-devices-hacked-on-pwn2own-day-3/&#34;&gt;https://www.bleepingcomputer.com/news/security/qnap-synology-lexmark-devices-hacked-on-pwn2own-day-3/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-25T08:58:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq08wdhar38cyrdhyx8w2ppylrdfcke2kdenf89g405uu9dzw4hrszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859gl8tq</id>
    
      <title type="html">Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq08wdhar38cyrdhyx8w2ppylrdfcke2kdenf89g405uu9dzw4hrszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p859gl8tq" />
    <content type="html">
      Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations&lt;br/&gt;&lt;br/&gt;The Irish data protection watchdog on Thursday fined LinkedIn €310 million ($335 million) for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising.&lt;br/&gt;&lt;br/&gt;&amp;#34;The inquiry examined LinkedIn&amp;#39;s processing of personal data for the purposes of behavioral analysis and targeted advertising of users who have created LinkedIn profiles (members),&amp;#34; the Data Protection Commission (DPC) said. &amp;#34;The decision [...] concerns the lawfulness, fairness and transparency of this processing.&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html&#34;&gt;https://thehackernews.com/2024/10/irish-watchdog-imposes-record-310.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #privacy
    </content>
    <updated>2024-10-25T08:54:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd56vz0kxqny68n995cu8k8nwnqgdgtd2xzx8qf9zc6hvl6w5dk9qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850wl47u</id>
    
      <title type="html">Insurance admin Landmark says data breach impacts 800,000 people ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd56vz0kxqny68n995cu8k8nwnqgdgtd2xzx8qf9zc6hvl6w5dk9qzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850wl47u" />
    <content type="html">
      Insurance admin Landmark says data breach impacts 800,000 people&lt;br/&gt;&lt;br/&gt;Insurance administrative services company Landmark Admin warns that a data breach impacts over 800,000 people from a May cyberattack&lt;br/&gt;&lt;br/&gt;Due to the sensitive nature of the stolen data, impacted people should monitor their credit reports and bank accounts for suspicious activity.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/&#34;&gt;https://www.bleepingcomputer.com/news/security/insurance-admin-landmark-says-data-breach-impacts-800-000-people/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #privacy
    </content>
    <updated>2024-10-25T08:49:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqdsdg29xuevzx69x6zwd7ccqgfy5svehm8sd00qrxc45u2gq8heqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85nmt7f6</id>
    
      <title type="html">UnitedHealth says data of 100 million stolen in Change Healthcare ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqdsdg29xuevzx69x6zwd7ccqgfy5svehm8sd00qrxc45u2gq8heqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85nmt7f6" />
    <content type="html">
      UnitedHealth says data of 100 million stolen in Change Healthcare breach&lt;br/&gt;&lt;br/&gt;UnitedHealth has confirmed for the first time that over 100 million people had their personal information and healthcare data stolen in the Change Healthcare ransomware attack, marking this as the largest healthcare data breach in recent years.&lt;br/&gt;&lt;br/&gt;This data breach was caused by a February ransomware attack on UnitedHealth subsidiary Change Healthcare, which led to widespread outages in the U.S. healthcare system.&lt;br/&gt;&lt;br/&gt;During the attack, the threat actors stole 6 TB of data and ultimately encrypted computers on the network, causing the company to shut down IT systems to prevent the spread of the attack.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/&#34;&gt;https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security #privacy
    </content>
    <updated>2024-10-25T08:46:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9y2l4733vkap4shp47yk7e7uf0hnq9v4d2m9vps2d6rzguw8uvyczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8570ufyh</id>
    
      <title type="html">Cisco fixes VPN DoS flaw discovered in password spray attacks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9y2l4733vkap4shp47yk7e7uf0hnq9v4d2m9vps2d6rzguw8uvyczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p8570ufyh" />
    <content type="html">
      Cisco fixes VPN DoS flaw discovered in password spray attacks&lt;br/&gt;&lt;br/&gt;Cisco fixed a denial of service flaw in its Cisco ASA and Firepower Threat Defense (FTD) software, which was discovered during large-scale brute force attacks against Cisco VPN devices in April.&lt;br/&gt;&lt;br/&gt;The flaw is tracked as CVE-2024-20481 and impacts all versions of Cisco ASA and Cisco FTD up until the latest versions of the software.&lt;br/&gt;&lt;br/&gt;&amp;#34;A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the RAVPN service,&amp;#34; reads the CVE-2024-20481 security advisory.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisco-fixes-vpn-dos-flaw-discovered-in-password-spray-attacks/&#34;&gt;https://www.bleepingcomputer.com/news/security/cisco-fixes-vpn-dos-flaw-discovered-in-password-spray-attacks/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-25T08:38:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs90ja8qn5ycdrljcwmg8a4zeh5mhymv4xlxcnwxcp08m5a0v92yyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85tyhe04</id>
    
      <title type="html">IBM Boosts Guardium Platform to Address Shadow AI, Quantum ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs90ja8qn5ycdrljcwmg8a4zeh5mhymv4xlxcnwxcp08m5a0v92yyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85tyhe04" />
    <content type="html">
      IBM Boosts Guardium Platform to Address Shadow AI, Quantum Cryptography&lt;br/&gt;&lt;br/&gt;IBM is updating and upgrading its Guardium platform to provide security for the two primary new technology problems: AI models and quantum safety. &lt;br/&gt;&lt;br/&gt;IBM Guardium AI Security and IBM Guardium Quantum Safe combine to form the newly launched IBM Guardium Data Security Center, which operates across the entire enterprise hybrid infrastructure&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/ibm-boosts-guardium-platform-to-address-shadow-ai-quantum-cryptography/&#34;&gt;https://www.securityweek.com/ibm-boosts-guardium-platform-to-address-shadow-ai-quantum-cryptography/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity
    </content>
    <updated>2024-10-23T21:21:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszfrtjle9zsf2eluv2kkctd4pvk6pdwrjcht8x2wfs2lwa296zxyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850z6rcj</id>
    
      <title type="html">CISA Warns of Active Exploitation of Microsoft SharePoint ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszfrtjle9zsf2eluv2kkctd4pvk6pdwrjcht8x2wfs2lwa296zxyqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p850z6rcj" />
    <content type="html">
      CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)&lt;br/&gt;&lt;br/&gt;A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday, citing evidence of active exploitation.&lt;br/&gt;&lt;br/&gt;The vulnerability, tracked as CVE-2024-38094 (CVSS score: 7.2), has been described as a deserialization vulnerability impacting SharePoint that could result in remote code execution.&lt;br/&gt;&lt;br/&gt;&amp;#34;An authenticated attacker with Site Owner permissions can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server,&amp;#34; Microsoft said in an alert for the flaw.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html&#34;&gt;https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-23T21:16:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs00gus36wj49k2y2la3zgtcug02y4kj79d5yylqv5zeyygt5egkjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85224rl0</id>
    
      <title type="html">Cisco takes DevHub portal offline after hacker publishes stolen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs00gus36wj49k2y2la3zgtcug02y4kj79d5yylqv5zeyygt5egkjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85224rl0" />
    <content type="html">
      Cisco takes DevHub portal offline after hacker publishes stolen data&lt;br/&gt;&lt;br/&gt;Cisco confirmed today that it took its public DevHub portal offline after a threat actor leaked &amp;#34;non-public&amp;#34; data, but it continues to state that there is no evidence that its systems were breached.&lt;br/&gt;&lt;br/&gt;This statement comes after a threat actor known as IntelBroker claimed to have breached Cisco and attempted to sell data and source code stolen from the company.&lt;br/&gt;&lt;br/&gt;Screenshots and files, provided to BleepingComputer, showed that the threat actor had access to most, if not all, of the data stored on this portal. This data included source code, configuration files with database credentials, technical documentation, and SQL files.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/&#34;&gt;https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-19T11:45:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstntszael0lak26l3lhyvj5uu0v3zstj92rhh5avzsg6qxrfxdm5gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853y7prz</id>
    
      <title type="html">Free TornadoCash or Samurai wallet devs! #nevent1q…f3k7</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstntszael0lak26l3lhyvj5uu0v3zstj92rhh5avzsg6qxrfxdm5gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p853y7prz" />
    <content type="html">
      Free TornadoCash or Samurai wallet devs! &lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs25t60qr8j0uxr36rwzwtnmq82xzlj42jcxatghs3u0rjuzpw6klgppemhxue69uhkummn9ekx7mp0qgsd3fhv7rped64g77dyf9l7ndmae9mkxdz37099cc6wyzr9jytxg7crqsqqqqqp8nf3k7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…f3k7&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; TD Bank&#39;s plea is an interesting read for anyone who believes that justice has been served in the US banking industry.&lt;br/&gt;&lt;br/&gt;If its “historic fine” tells us anything, it&#39;s that that crime pays when you&#39;re a banker.&lt;br/&gt;&lt;br/&gt;Full story: &lt;br/&gt;&lt;a href=&#34;https://www.therage.co/untitled-2/&#34;&gt;https://www.therage.co/untitled-2/&lt;/a&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-10-15T18:57:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr8t00sdnswamd9m7nj0dfkje2e0hlxuqhzxy58wsetyypl67fdpqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85j64gq5</id>
    
      <title type="html">GitHub Patches Critical Vulnerability in Enterprise Server Code ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr8t00sdnswamd9m7nj0dfkje2e0hlxuqhzxy58wsetyypl67fdpqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85j64gq5" />
    <content type="html">
      GitHub Patches Critical Vulnerability in Enterprise Server&lt;br/&gt;&lt;br/&gt;Code hosting platform GitHub has released patches for a critical-severity vulnerability in GitHub Enterprise Server that could lead to unauthorized access to affected instances.&lt;br/&gt;&lt;br/&gt;Tracked as CVE-2024-9487 (CVSS score of 9.5), the bug was introduced in May 2024 as part of the remediations released for CVE-2024-4985, a critical authentication bypass defect allowing attackers to forge SAML responses and gain administrative access to the Enterprise Server.&lt;br/&gt;&lt;br/&gt;The vulnerability was resolved in GitHub Enterprise Server versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2, which also address a medium-severity information disclosure bug that could be exploited through malicious SVG files.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/&#34;&gt;https://www.securityweek.com/github-patches-critical-vulnerability-in-enterprise-server/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-15T18:40:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz0elw5h9rrvamejmhf6ezln4ua49jfqlmh4fvrn78mlf6ld3xzaqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85c586rd</id>
    
      <title type="html">New FIDO proposal lets you securely move passkeys across ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz0elw5h9rrvamejmhf6ezln4ua49jfqlmh4fvrn78mlf6ld3xzaqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85c586rd" />
    <content type="html">
      New FIDO proposal lets you securely move passkeys across platforms&lt;br/&gt;&lt;br/&gt;The Fast IDentity Online (FIDO) Alliance has published a working draft of a new specification that aims to enable the secure transfer of passkeys between different providers.&lt;br/&gt;&lt;br/&gt;Passkeys are a method of authentication without a password that leverages public-key cryptography to authenticate users without requiring them to remember or manage long strings of characters.&lt;br/&gt;&lt;br/&gt;The new specification that FIDO proposes essentially addresses the lack of widely accepted secure standards for credential transfer, eliminating the complications or practical limitations when switching between providers.&lt;br/&gt;&lt;br/&gt;The drafts were developed with the contribution of specialists from FIDO associate members and stakeholders like Dashlane, Bitwarden, 1Password, NordPass, and Google.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/new-fido-proposal-lets-you-securely-move-passkeys-across-platforms/&#34;&gt;https://www.bleepingcomputer.com/news/security/new-fido-proposal-lets-you-securely-move-passkeys-across-platforms/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #security
    </content>
    <updated>2024-10-15T18:33:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst68w43r5xuptt75andykj8wnjqkaw6m5w2lg7vp8yq40nd0g4fuqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85awuc2w</id>
    
      <title type="html">Microsoft deprecates PPTP and L2TP VPN protocols in Windows ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst68w43r5xuptt75andykj8wnjqkaw6m5w2lg7vp8yq40nd0g4fuqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85awuc2w" />
    <content type="html">
      Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server &lt;br/&gt;&lt;br/&gt;Microsoft has officially deprecated the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) in future versions of Windows Server, recommending admins switch to different protocols that offer increased security.&lt;br/&gt;&lt;br/&gt;PPTP is vulnerable to offline brute force attacks of captured authentication hashes, and L2TP provides no encryption unless coupled with another protocol, like IPsec. However, if L2TP/IPsec is not configured correctly, it can introduce weaknesses that make it susceptible to attacks.&lt;br/&gt;&lt;br/&gt;&amp;#34;The move is part of Microsoft&amp;#39;s strategy to enhance security and performance by transitioning users to more robust protocols like Secure Socket Tunneling Protocol (SSTP) and Internet Key Exchange version 2 (IKEv2),&amp;#34; Microsoft announced in a post this week.&lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/microsoft-deprecates-pptp-and-l2tp-vpn-protocols-in-windows-server/&#34;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-deprecates-pptp-and-l2tp-vpn-protocols-in-windows-server/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#cybersecurity #privacy #security&lt;br/&gt;
    </content>
    <updated>2024-10-15T06:13:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg29gaudly0vyc4njcshg60pvlc98jvq8fhfcmrwhhln6mtr08z5szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85yyhtkw</id>
    
      <title type="html">Google warns uBlock Origin and other extensions may be disabled ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg29gaudly0vyc4njcshg60pvlc98jvq8fhfcmrwhhln6mtr08z5szyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85yyhtkw" />
    <content type="html">
      Google warns uBlock Origin and other extensions may be disabled soon&lt;br/&gt;&lt;br/&gt;The warning includes a link to a Google support bulletin that states the browser extension may be disabled to protect users&amp;#39; privacy and security.&lt;br/&gt;&lt;br/&gt;&amp;#34;To better protect your privacy and security, Chrome and the Chrome Web Store require extensions to be up-to-date with new requirements,&amp;#34; reads Google&amp;#39;s support bulletin.&lt;br/&gt;&lt;br/&gt;&amp;#34;uBO is a Manifest v2 extension, hence the warning in your Google Chrome browser. There is no Manifest v3 version of uBO, hence the browser will suggest alternative extensions as a replacement for uBO,&amp;#34;&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/google/google-warns-ublock-origin-and-other-extensions-may-be-disabled-soon/&#34;&gt;https://www.bleepingcomputer.com/news/google/google-warns-ublock-origin-and-other-extensions-may-be-disabled-soon/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #cybersecurity #privacy
    </content>
    <updated>2024-10-15T06:01:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq5v78hkauq6njxgr8utxqkagc3cmm4dwt206yc48fy5e0wel4xxqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85rudefd</id>
    
      <title type="html">Cisco investigates breach after stolen data for sale on hacking ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq5v78hkauq6njxgr8utxqkagc3cmm4dwt206yc48fy5e0wel4xxqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85rudefd" />
    <content type="html">
      Cisco investigates breach after stolen data for sale on hacking forum&lt;br/&gt;&lt;br/&gt;&amp;#34;Compromised data: Github projects, Gitlab Projects, SonarQube projects, Source code, hard coded credentials, Certificates, Customer SRCs, Cisco Confidential Documents, Jira tickets, API tokens, AWS Private buckets, Cisco Technology SRCs, Docker Builds, Azure Storage buckets, Private &amp;amp; Public keys, SSL Certificates, Cisco Premium Products &amp;amp; More!,&amp;#34; reads the post to a hacking forum.&lt;br/&gt;&lt;br/&gt;IntelBroker also shared samples of the alleged stolen data, including a database, customer information, various customer documentation, and screenshots of customer management portals.&lt;br/&gt;&lt;br/&gt;However, the threat actor did not provide further details about how the data was obtained.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/&#34;&gt;https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #cybersecurity #privacy
    </content>
    <updated>2024-10-15T05:56:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxr5z2e64edxnuz5hpg68d3ze3d505y7327zwf9acfmccrn8n6nwczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p858rs8lw</id>
    
      <title type="html">Recent Firefox Zero-Day Exploited Against Tor Browser Users ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxr5z2e64edxnuz5hpg68d3ze3d505y7327zwf9acfmccrn8n6nwczyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p858rs8lw" />
    <content type="html">
      Recent Firefox Zero-Day Exploited Against Tor Browser Users&lt;br/&gt;&lt;br/&gt;Patches for CVE-2024-9680, which were included in Firefox version 131.0.2 and Firefox ESR versions 128.3.1 and 115.16.1, are rolling out in Tor browser version 13.5.7.&lt;br/&gt;&lt;br/&gt;The Tor Project noted that Mozilla is aware of attacks exploiting CVE-2024-9680 against Tor Browser users.  &lt;br/&gt;&lt;br/&gt;“Using this vulnerability, an attacker could take control of Tor browser, but probably not deanonymize you in Tails,” Tor’s maintainers explained. &lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://www.securityweek.com/recent-firefox-zero-day-exploited-against-tor-browser-users/&#34;&gt;https://www.securityweek.com/recent-firefox-zero-day-exploited-against-tor-browser-users/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #cybersecurity #privacy
    </content>
    <updated>2024-10-15T05:53:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2pr7gc5lsts75g9vq0748r39frtkf3z4k8a6ns8ueh4kc40najcszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856t23e5</id>
    
      <title type="html">Chinese Scientists Report Using Quantum Computer to Hack ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2pr7gc5lsts75g9vq0748r39frtkf3z4k8a6ns8ueh4kc40najcszyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p856t23e5" />
    <content type="html">
      Chinese Scientists Report Using Quantum Computer to Hack Military-grade Encryption&lt;br/&gt;&lt;br/&gt;Looks like marketing for D-Wave crap, but you never know. What if 🤷‍♂️ &lt;br/&gt;&lt;br/&gt;See more:&lt;br/&gt;&lt;a href=&#34;https://thequantuminsider.com/2024/10/11/chinese-scientists-report-using-quantum-computer-to-hack-military-grade-encryption/&#34;&gt;https://thequantuminsider.com/2024/10/11/chinese-scientists-report-using-quantum-computer-to-hack-military-grade-encryption/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #security
    </content>
    <updated>2024-10-13T21:07:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs22kc5dfxzzrz7s899w3d7jc565m3d2yvw77kzlhl3zezphmyrjjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85w877e2</id>
    
      <title type="html">If you want to track the latest news about cyber security and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs22kc5dfxzzrz7s899w3d7jc565m3d2yvw77kzlhl3zezphmyrjjqzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85w877e2" />
    <content type="html">
      If you want to track the latest news about cyber security and privacy, check the zCat!&lt;br/&gt;&lt;br/&gt;zCat is an Android app, which lets you create your own news feed. &lt;br/&gt;&lt;br/&gt;It also tracks ZCash, privacy focused cryptocurrency based on ZK 😎&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://play.google.com/store/apps/details?id=crypto.crab.app.zcat&#34;&gt;https://play.google.com/store/apps/details?id=crypto.crab.app.zcat&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#zcash #privacy #security
    </content>
    <updated>2024-10-12T12:13:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8xfjr9tsq7qzucvpl45fdznvrfp4vwk68zlpcm8ytk6psp0s6m4gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85yaws3g</id>
    
      <title type="html">Experts Warn of Critical Unpatched Vulnerability in Linear eMerge ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8xfjr9tsq7qzucvpl45fdznvrfp4vwk68zlpcm8ytk6psp0s6m4gzyqt06fhsqp20vc23c67hjf0daaq4scgr4uvag30e8an0tcjtx3p85yaws3g" />
    <content type="html">
      Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems&lt;br/&gt;&lt;br/&gt;Cybersecurity researchers are warning about an unpatched vulnerability in Nice Linear eMerge E3 access controller systems that could allow for the execution of arbitrary operating system (OS) commands.&lt;br/&gt;&lt;br/&gt;The flaw, assigned the CVE identifier CVE-2024-9441, carries a CVSS score of 9.8 out of a maximum of 10.0, according to VulnCheck.&lt;br/&gt;&lt;br/&gt;&amp;#34;A vulnerability in the Nortek Linear eMerge E3 allows remote unauthenticated attackers to cause the device to execute arbitrary command,&amp;#34; SSD Disclosure said in an advisory for the flaw released late last month, stating the vendor has yet to provide a fix or a workaround.&lt;br/&gt;&lt;br/&gt;See more: &lt;a href=&#34;https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html&#34;&gt;https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#security #hacking
    </content>
    <updated>2024-10-12T12:07:54Z</updated>
  </entry>

</feed>